Analysis
-
max time kernel
97s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 14:59
Static task
static1
Behavioral task
behavioral1
Sample
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe
Resource
win7-20220414-en
General
-
Target
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe
-
Size
699KB
-
MD5
5807ae1cd17e7f9bc109b3df90b243ba
-
SHA1
08595bc28d5f185fce26da9e8362d05ad6eed16d
-
SHA256
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c
-
SHA512
ad790053c056b0bf519c2bae2585c17f063ecc30961936f78092b9684df693d1eb83b15422841172ebb9398a689b4d3f115efb44bbd156739278cca4147482a9
Malware Config
Extracted
quasar
2.1.0.0
Office04
2.tcp.ngrok.io:12699
VNM_MUTEX_ljpH86m9yQvMdFiQrM
-
encryption_key
u0b02uZLknYm9c6g9jJR
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Security
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/4852-137-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def -
Quasar Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4852-137-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar -
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Security = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe\"" bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com 17 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exebc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exedescription pid Process procid_target PID 4892 set thread context of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4868 set thread context of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exedescription pid Process Token: SeDebugPrivilege 4852 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe Token: SeDebugPrivilege 4852 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exepid Process 4852 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exebc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exebc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exedescription pid Process procid_target PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4892 wrote to memory of 4868 4892 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 78 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4868 wrote to memory of 4852 4868 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 79 PID 4852 wrote to memory of 4216 4852 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 80 PID 4852 wrote to memory of 4216 4852 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 80 PID 4852 wrote to memory of 4216 4852 bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:4216
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe.log
Filesize410B
MD53bbb825ef1319deb378787046587112b
SHA167da95f0031be525b4cf10645632ca34d66b913b
SHA256d9c6d00fad02f7a9ef0fcddc298ffd58b17020fb12b1336d5733237cbfadb1e0
SHA5127771ae543e188d544e1bb6c65e0453a6777c1c39790a355f4cce652a815bfaf94dd426de3db910a67bd06e463ac0143d9e2ca44d2b12af7f0d84c27b4a09cc54