Analysis
-
max time kernel
12s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-05-2022 23:22
Static task
static1
Behavioral task
behavioral1
Sample
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe
Resource
win7-20220414-en
General
-
Target
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe
-
Size
962KB
-
MD5
2d8a7a711bf1308a13f02f36ad88bf3b
-
SHA1
df45338383fda3fdc745c9564b76ebd84aaffe19
-
SHA256
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
-
SHA512
1cc23482ce5a3ae33713c1aebb6ef503d211512934d12b873ba86d140f9d042dbbd1544aa399b5fefa5a371e24209a21f5994146d7cda9c5ffc63c4b0005b74a
Malware Config
Extracted
quasar
2.1.0.0
Office04
codexm0106.ddns.net:1177
VNM_MUTEX_Xnd6D5iIpqWwMJAqx5
-
encryption_key
iN4UZnXEraSZhG0zbaFO
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
2000
-
startup_key
windows startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/4032-134-0x0000000000400000-0x00000000004C4000-memory.dmp disable_win_def -
Quasar Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4032-134-0x0000000000400000-0x00000000004C4000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 3 IoCs
Processes:
Client.exeClient.exeClient.exepid Process 4200 Client.exe 960 Client.exe 864 Client.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation Client.exe -
Processes:
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exeClient.exedescription pid Process procid_target PID 4296 set thread context of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4200 set thread context of 864 4200 Client.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 372 864 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4500 schtasks.exe 3964 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Client.exepowershell.exepid Process 4200 Client.exe 4200 Client.exe 4048 powershell.exe 4048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exeClient.exepowershell.exeClient.exedescription pid Process Token: SeDebugPrivilege 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe Token: SeDebugPrivilege 4200 Client.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 864 Client.exe Token: SeDebugPrivilege 864 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid Process 864 Client.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exeClient.exeClient.execmd.exedescription pid Process procid_target PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4296 wrote to memory of 4032 4296 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 82 PID 4032 wrote to memory of 4500 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 83 PID 4032 wrote to memory of 4500 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 83 PID 4032 wrote to memory of 4500 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 83 PID 4032 wrote to memory of 4200 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 85 PID 4032 wrote to memory of 4200 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 85 PID 4032 wrote to memory of 4200 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 85 PID 4032 wrote to memory of 4048 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 86 PID 4032 wrote to memory of 4048 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 86 PID 4032 wrote to memory of 4048 4032 472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe 86 PID 4200 wrote to memory of 960 4200 Client.exe 88 PID 4200 wrote to memory of 960 4200 Client.exe 88 PID 4200 wrote to memory of 960 4200 Client.exe 88 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 4200 wrote to memory of 864 4200 Client.exe 89 PID 864 wrote to memory of 3964 864 Client.exe 90 PID 864 wrote to memory of 3964 864 Client.exe 90 PID 864 wrote to memory of 3964 864 Client.exe 90 PID 864 wrote to memory of 5060 864 Client.exe 92 PID 864 wrote to memory of 5060 864 Client.exe 92 PID 864 wrote to memory of 5060 864 Client.exe 92 PID 5060 wrote to memory of 3700 5060 cmd.exe 96 PID 5060 wrote to memory of 3700 5060 cmd.exe 96 PID 5060 wrote to memory of 3700 5060 cmd.exe 96 PID 5060 wrote to memory of 1992 5060 cmd.exe 98 PID 5060 wrote to memory of 1992 5060 cmd.exe 98 PID 5060 wrote to memory of 1992 5060 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe"C:\Users\Admin\AppData\Local\Temp\472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe"C:\Users\Admin\AppData\Local\Temp\472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe"2⤵
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "windows startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4500
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
PID:960
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "windows startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:3964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LJ1rKPwzUCOv.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:3700
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:1992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 22725⤵
- Program crash
PID:372
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 864 -ip 8641⤵PID:3364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5f1788c991f03bf9d9beb2fce24771813
SHA1ca3a96711709daf6224ee397a44f5f7f425c41fc
SHA25647fbdaac20cc03489e0a78ab94aa0b8d4725a3343cb38028f3f49e42587b1ad8
SHA512d9a54d8b21d239bb1e9658922f42b5e53b8dfd3b0531bb6fb0c0fc286c1759770c6d265267c4b265920c80f9ea1e48f19a56ace8986bd2e87861888d8992408b
-
Filesize
962KB
MD52d8a7a711bf1308a13f02f36ad88bf3b
SHA1df45338383fda3fdc745c9564b76ebd84aaffe19
SHA256472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
SHA5121cc23482ce5a3ae33713c1aebb6ef503d211512934d12b873ba86d140f9d042dbbd1544aa399b5fefa5a371e24209a21f5994146d7cda9c5ffc63c4b0005b74a
-
Filesize
962KB
MD52d8a7a711bf1308a13f02f36ad88bf3b
SHA1df45338383fda3fdc745c9564b76ebd84aaffe19
SHA256472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
SHA5121cc23482ce5a3ae33713c1aebb6ef503d211512934d12b873ba86d140f9d042dbbd1544aa399b5fefa5a371e24209a21f5994146d7cda9c5ffc63c4b0005b74a
-
Filesize
962KB
MD52d8a7a711bf1308a13f02f36ad88bf3b
SHA1df45338383fda3fdc745c9564b76ebd84aaffe19
SHA256472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
SHA5121cc23482ce5a3ae33713c1aebb6ef503d211512934d12b873ba86d140f9d042dbbd1544aa399b5fefa5a371e24209a21f5994146d7cda9c5ffc63c4b0005b74a
-
Filesize
962KB
MD52d8a7a711bf1308a13f02f36ad88bf3b
SHA1df45338383fda3fdc745c9564b76ebd84aaffe19
SHA256472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
SHA5121cc23482ce5a3ae33713c1aebb6ef503d211512934d12b873ba86d140f9d042dbbd1544aa399b5fefa5a371e24209a21f5994146d7cda9c5ffc63c4b0005b74a