Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-05-2022 20:13

General

  • Target

    a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe

  • Size

    550KB

  • MD5

    87288d8d050aa668f25388f9e12d56f6

  • SHA1

    fcfb9d9d982e787fc32e60e4d5efe6a6c4f00acf

  • SHA256

    a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8

  • SHA512

    28e6a5f7b3d6cab605383f4f35badfbb963035d57fa2afc4ef704cd58522ded2bacea690fb13f0977ced2a0a232956db87a2dffb6118f7b3838f44980effc97a

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

127.0.0.1:4782

karmina113.sytes.net:2222

karmina200.sytes.net:2222

Mutex

VNM_MUTEX_c2q7y2ayYutZ2XaYe7

Attributes
  • encryption_key

    Utv1d8B5zhHYcWfy3OEQ

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 8 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 8 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • suricata: ET MALWARE Common RAT Connectivity Check Observed

    suricata: ET MALWARE Common RAT Connectivity Check Observed

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe
    "C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe
      "C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe"
      2⤵
      • Loads dropped DLL
      • Windows security modification
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:436
      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1076
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1652
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
          4⤵
            PID:748
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\ZY9bqiOLWoY4.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            4⤵
              PID:1144
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              4⤵
              • Runs ping.exe
              PID:604
            • C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe
              "C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe"
              4⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1620
              • C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe
                "C:\Users\Admin\AppData\Local\Temp\a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8.exe"
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1968

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ZY9bqiOLWoY4.bat

        Filesize

        261B

        MD5

        a09c9dddcb3d25f1da0ae2b591048de7

        SHA1

        f27b1c50dcad2cef0ff7f1d35deb02f692a2886c

        SHA256

        24c3b1bc2d5240fecc7887c835489e4a99ce4936971dba6b8319a1d006938ecd

        SHA512

        3880d3b58870e6b0e0a6d2e59cdab5d6860677afc0ecb40d65940ce3e10c78608c70d1fd9c776a5b93f5a78beda1328435761dc6803776f05d011f33b5139b9f

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        550KB

        MD5

        87288d8d050aa668f25388f9e12d56f6

        SHA1

        fcfb9d9d982e787fc32e60e4d5efe6a6c4f00acf

        SHA256

        a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8

        SHA512

        28e6a5f7b3d6cab605383f4f35badfbb963035d57fa2afc4ef704cd58522ded2bacea690fb13f0977ced2a0a232956db87a2dffb6118f7b3838f44980effc97a

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        550KB

        MD5

        87288d8d050aa668f25388f9e12d56f6

        SHA1

        fcfb9d9d982e787fc32e60e4d5efe6a6c4f00acf

        SHA256

        a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8

        SHA512

        28e6a5f7b3d6cab605383f4f35badfbb963035d57fa2afc4ef704cd58522ded2bacea690fb13f0977ced2a0a232956db87a2dffb6118f7b3838f44980effc97a

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        550KB

        MD5

        87288d8d050aa668f25388f9e12d56f6

        SHA1

        fcfb9d9d982e787fc32e60e4d5efe6a6c4f00acf

        SHA256

        a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8

        SHA512

        28e6a5f7b3d6cab605383f4f35badfbb963035d57fa2afc4ef704cd58522ded2bacea690fb13f0977ced2a0a232956db87a2dffb6118f7b3838f44980effc97a

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        550KB

        MD5

        87288d8d050aa668f25388f9e12d56f6

        SHA1

        fcfb9d9d982e787fc32e60e4d5efe6a6c4f00acf

        SHA256

        a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8

        SHA512

        28e6a5f7b3d6cab605383f4f35badfbb963035d57fa2afc4ef704cd58522ded2bacea690fb13f0977ced2a0a232956db87a2dffb6118f7b3838f44980effc97a

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        550KB

        MD5

        87288d8d050aa668f25388f9e12d56f6

        SHA1

        fcfb9d9d982e787fc32e60e4d5efe6a6c4f00acf

        SHA256

        a5d9e8d42663f4d7c3690d965df7a5b8ac3999d5fd40bb067ade837ae9829af8

        SHA512

        28e6a5f7b3d6cab605383f4f35badfbb963035d57fa2afc4ef704cd58522ded2bacea690fb13f0977ced2a0a232956db87a2dffb6118f7b3838f44980effc97a

      • memory/436-68-0x0000000000000000-mapping.dmp

      • memory/604-97-0x0000000000000000-mapping.dmp

      • memory/748-93-0x0000000000000000-mapping.dmp

      • memory/1076-83-0x0000000000486CBE-mapping.dmp

      • memory/1096-73-0x0000000000C40000-0x0000000000CD0000-memory.dmp

        Filesize

        576KB

      • memory/1096-70-0x0000000000000000-mapping.dmp

      • memory/1136-92-0x0000000000000000-mapping.dmp

      • memory/1144-96-0x0000000000000000-mapping.dmp

      • memory/1620-98-0x0000000000000000-mapping.dmp

      • memory/1652-91-0x0000000000000000-mapping.dmp

      • memory/1688-90-0x000000006E6A0000-0x000000006EC4B000-memory.dmp

        Filesize

        5.7MB

      • memory/1688-74-0x0000000000000000-mapping.dmp

      • memory/1692-94-0x0000000000000000-mapping.dmp

      • memory/1932-55-0x0000000000800000-0x0000000000808000-memory.dmp

        Filesize

        32KB

      • memory/1932-54-0x0000000000DA0000-0x0000000000E30000-memory.dmp

        Filesize

        576KB

      • memory/1968-105-0x0000000000486CBE-mapping.dmp

      • memory/2044-61-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2044-62-0x0000000000486CBE-mapping.dmp

      • memory/2044-60-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2044-64-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2044-59-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2044-57-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2044-56-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2044-66-0x0000000000400000-0x000000000048C000-memory.dmp

        Filesize

        560KB

      • memory/2044-67-0x00000000757C1000-0x00000000757C3000-memory.dmp

        Filesize

        8KB