Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 22:34

General

  • Target

    3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5.exe

  • Size

    1.6MB

  • MD5

    cef80abf8c3f0cde0085f3253ab0381a

  • SHA1

    a7de60994d1c16409700a2deccb6cb1423153967

  • SHA256

    3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5

  • SHA512

    80e4a4dad8c49ed24226346ec769ad595e1ffa26c2167ae0e7c622a10e59cf12a2d2ec1486d7cb168cc3df963d2653be3669855ced35b67548e860573b4f850d

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • suricata: ET MALWARE Common RAT Connectivity Check Observed

    suricata: ET MALWARE Common RAT Connectivity Check Observed

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5.exe
    "C:\Users\Admin\AppData\Local\Temp\3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5.exe"
    1⤵
    • Windows security modification
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "Computer_Waifu" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:3444
    • C:\Program Files (x86)\SubDir\Client.exe
      "C:\Program Files (x86)\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Computer_Waifu" /sc ONLOGON /tr "C:\Program Files (x86)\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2364
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SPcoVgDA6uYr.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:4992
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 10 localhost
            4⤵
            • Runs ping.exe
            PID:920
          • C:\Program Files (x86)\SubDir\Client.exe
            "C:\Program Files (x86)\SubDir\Client.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 2244
          3⤵
          • Program crash
          PID:3996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 2244
          3⤵
          • Program crash
          PID:1736
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4464 -ip 4464
      1⤵
        PID:2356

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\SubDir\Client.exe

        Filesize

        1.6MB

        MD5

        cef80abf8c3f0cde0085f3253ab0381a

        SHA1

        a7de60994d1c16409700a2deccb6cb1423153967

        SHA256

        3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5

        SHA512

        80e4a4dad8c49ed24226346ec769ad595e1ffa26c2167ae0e7c622a10e59cf12a2d2ec1486d7cb168cc3df963d2653be3669855ced35b67548e860573b4f850d

      • C:\Program Files (x86)\SubDir\Client.exe

        Filesize

        1.6MB

        MD5

        cef80abf8c3f0cde0085f3253ab0381a

        SHA1

        a7de60994d1c16409700a2deccb6cb1423153967

        SHA256

        3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5

        SHA512

        80e4a4dad8c49ed24226346ec769ad595e1ffa26c2167ae0e7c622a10e59cf12a2d2ec1486d7cb168cc3df963d2653be3669855ced35b67548e860573b4f850d

      • C:\Users\Admin\AppData\Local\Temp\SPcoVgDA6uYr.bat

        Filesize

        199B

        MD5

        76c7e3021c794872d8c78d2881f9a38d

        SHA1

        b6bca19080086b68925c74d3243735dd5819fd62

        SHA256

        cefd78f3ce8babf35b2f3b44a4e9451de8277cbcc2d8597b6781a1ef4b615843

        SHA512

        2b0130e005f7f2482e8136d675499fd796b529eafbe113e865cc77f4d312ace850184db0206f400f25171e24e9c75343ca206b0cacc15bbdcbef10d1310d0c7a

      • \??\c:\program files (x86)\subdir\client.exe

        Filesize

        1.6MB

        MD5

        cef80abf8c3f0cde0085f3253ab0381a

        SHA1

        a7de60994d1c16409700a2deccb6cb1423153967

        SHA256

        3c408a0b4fc83fa3e387a1d45e03009340a75b1519529eb55d910e84d9e6bbe5

        SHA512

        80e4a4dad8c49ed24226346ec769ad595e1ffa26c2167ae0e7c622a10e59cf12a2d2ec1486d7cb168cc3df963d2653be3669855ced35b67548e860573b4f850d

      • memory/560-133-0x0000000006E20000-0x0000000006EB2000-memory.dmp

        Filesize

        584KB

      • memory/560-135-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/560-136-0x0000000009280000-0x00000000092BC000-memory.dmp

        Filesize

        240KB

      • memory/560-134-0x0000000006F30000-0x0000000006F96000-memory.dmp

        Filesize

        408KB

      • memory/560-130-0x0000000000920000-0x0000000000D96000-memory.dmp

        Filesize

        4.5MB

      • memory/560-132-0x00000000072F0000-0x0000000007894000-memory.dmp

        Filesize

        5.6MB

      • memory/560-131-0x0000000000920000-0x0000000000D96000-memory.dmp

        Filesize

        4.5MB

      • memory/920-156-0x0000000000000000-mapping.dmp

      • memory/2364-148-0x0000000000000000-mapping.dmp

      • memory/3444-137-0x0000000000000000-mapping.dmp

      • memory/3972-146-0x0000000004F50000-0x0000000004FB6000-memory.dmp

        Filesize

        408KB

      • memory/3972-160-0x00000000071B0000-0x00000000071BA000-memory.dmp

        Filesize

        40KB

      • memory/3972-144-0x0000000004FE0000-0x0000000005608000-memory.dmp

        Filesize

        6.2MB

      • memory/3972-147-0x0000000005DD0000-0x0000000005DEE000-memory.dmp

        Filesize

        120KB

      • memory/3972-143-0x0000000002490000-0x00000000024C6000-memory.dmp

        Filesize

        216KB

      • memory/3972-145-0x0000000004E30000-0x0000000004E52000-memory.dmp

        Filesize

        136KB

      • memory/3972-158-0x00000000065A0000-0x00000000065BA000-memory.dmp

        Filesize

        104KB

      • memory/3972-151-0x00000000063E0000-0x0000000006412000-memory.dmp

        Filesize

        200KB

      • memory/3972-153-0x000000006F970000-0x000000006F9BC000-memory.dmp

        Filesize

        304KB

      • memory/3972-157-0x0000000007820000-0x0000000007E9A000-memory.dmp

        Filesize

        6.5MB

      • memory/3972-140-0x0000000000000000-mapping.dmp

      • memory/3972-155-0x00000000063C0000-0x00000000063DE000-memory.dmp

        Filesize

        120KB

      • memory/3996-159-0x0000000000000000-mapping.dmp

      • memory/4372-161-0x0000000000000000-mapping.dmp

      • memory/4372-163-0x0000000000CA0000-0x0000000001116000-memory.dmp

        Filesize

        4.5MB

      • memory/4372-164-0x0000000000CA0000-0x0000000001116000-memory.dmp

        Filesize

        4.5MB

      • memory/4464-142-0x0000000000CA0000-0x0000000001116000-memory.dmp

        Filesize

        4.5MB

      • memory/4464-149-0x0000000007E90000-0x0000000007E9A000-memory.dmp

        Filesize

        40KB

      • memory/4464-138-0x0000000000000000-mapping.dmp

      • memory/4632-150-0x0000000000000000-mapping.dmp

      • memory/4992-154-0x0000000000000000-mapping.dmp