Analysis
-
max time kernel
167s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 07:29
Static task
static1
Behavioral task
behavioral1
Sample
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe
Resource
win10v2004-20220414-en
General
-
Target
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe
-
Size
15.0MB
-
MD5
35ecc52f8d324f88c65432ca49d6f223
-
SHA1
4102ef0264dac3521052e1acb32bca0c12162cae
-
SHA256
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3
-
SHA512
e91092fc235acda0f9d71e3867f11b3c237627aa69049a8588b3466e3efb09663eab11f046e56f9b87aaa988322c0e1d8ea1278565624c152922da8972e1a50a
Malware Config
Extracted
quasar
2.1.0.0
WinDir
0.tcp.ngrok.io:18130
VNM_MUTEX_kdX9JMeh4Tx0gANlkq
-
encryption_key
4z4UlPgqlyr06tHY9YuZ
-
install_name
WindowsSystemDirectoryManager.exe
-
log_directory
JR_DIR
-
reconnect_delay
3000
-
startup_key
WindowsSystemDirectoryManager
-
subdirectory
WinSysDir
Signatures
-
Contains code to disable Windows Defender 8 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/files/0x0008000000012305-57.dat disable_win_def behavioral1/files/0x0008000000012305-59.dat disable_win_def behavioral1/files/0x0008000000012305-60.dat disable_win_def behavioral1/memory/524-62-0x0000000000070000-0x00000000000FC000-memory.dmp disable_win_def behavioral1/files/0x0008000000012321-69.dat disable_win_def behavioral1/files/0x0008000000012321-72.dat disable_win_def behavioral1/memory/1300-74-0x0000000001060000-0x00000000010EC000-memory.dmp disable_win_def behavioral1/files/0x0008000000012321-71.dat disable_win_def -
Quasar Payload 8 IoCs
Processes:
resource yara_rule behavioral1/files/0x0008000000012305-57.dat family_quasar behavioral1/files/0x0008000000012305-59.dat family_quasar behavioral1/files/0x0008000000012305-60.dat family_quasar behavioral1/memory/524-62-0x0000000000070000-0x00000000000FC000-memory.dmp family_quasar behavioral1/files/0x0008000000012321-69.dat family_quasar behavioral1/files/0x0008000000012321-72.dat family_quasar behavioral1/memory/1300-74-0x0000000001060000-0x00000000010EC000-memory.dmp family_quasar behavioral1/files/0x0008000000012321-71.dat family_quasar -
Processes:
DllHost.exedescription flow ioc Process File opened for modification C:\Windows\SysWOW64\GDIPFONTCACHEV1.DAT DllHost.exe 2 ip-api.com