Analysis
-
max time kernel
139s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe
Resource
win7-20220414-en
General
-
Target
bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe
-
Size
351KB
-
MD5
ce5ad18cc090c8a1405f084d9144671d
-
SHA1
67530a17331ad6477e4b25ef866412349791a3cb
-
SHA256
bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31
-
SHA512
66f3d07eb12c2a94f30fd37dadf832769fb87d10be3751f91ac474f4e72d86b535c5159f7fe2ac80500a844e9a7ace0db1d6dac69c1150475f03c207b9e8bc2a
Malware Config
Extracted
quasar
2.1.0.0
1
10.0.2.15:1337
VNM_MUTEX_28broDsmlFWTzx7r3B
-
encryption_key
0hi0YaDWMh7jhT37Tcsm
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x000a0000000122e8-56.dat disable_win_def behavioral1/files/0x000a0000000122e8-58.dat disable_win_def behavioral1/files/0x000a0000000122e8-59.dat disable_win_def behavioral1/memory/2012-60-0x0000000000840000-0x00000000008CC000-memory.dmp disable_win_def -
Quasar Payload 4 IoCs
resource yara_rule behavioral1/files/0x000a0000000122e8-56.dat family_quasar behavioral1/files/0x000a0000000122e8-58.dat family_quasar behavioral1/files/0x000a0000000122e8-59.dat family_quasar behavioral1/memory/2012-60-0x0000000000840000-0x00000000008CC000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 1 IoCs
pid Process 2012 Iwpblky.exe -
Loads dropped DLL 1 IoCs
pid Process 1792 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 Iwpblky.exe Token: SeDebugPrivilege 2012 Iwpblky.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 Iwpblky.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2012 1792 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe 28 PID 1792 wrote to memory of 2012 1792 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe 28 PID 1792 wrote to memory of 2012 1792 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe 28 PID 1792 wrote to memory of 2012 1792 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe 28 PID 2012 wrote to memory of 1384 2012 Iwpblky.exe 31 PID 2012 wrote to memory of 1384 2012 Iwpblky.exe 31 PID 2012 wrote to memory of 1384 2012 Iwpblky.exe 31 PID 2012 wrote to memory of 1384 2012 Iwpblky.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe"C:\Users\Admin\AppData\Local\Temp\bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe"C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1384
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD57877fc84e5fad8018d10fedee3fd7b4e
SHA1ee58d0a7ee2db778d20bf292393696614443fefa
SHA2562a2e8ebc771d27fc3b32a7e059e1f9aa458324cb225ebea2b4bed0acd191e1be
SHA512ba5a3e9072876c89f1c2bb40e748fd6eb7ae0c9eb99756ab4bcd1bb5d5b1dedb1e517b0e3efd354cf3ed58bb3c49b8d365d340d95781b8eb8577e22ab0675175
-
Filesize
534KB
MD57877fc84e5fad8018d10fedee3fd7b4e
SHA1ee58d0a7ee2db778d20bf292393696614443fefa
SHA2562a2e8ebc771d27fc3b32a7e059e1f9aa458324cb225ebea2b4bed0acd191e1be
SHA512ba5a3e9072876c89f1c2bb40e748fd6eb7ae0c9eb99756ab4bcd1bb5d5b1dedb1e517b0e3efd354cf3ed58bb3c49b8d365d340d95781b8eb8577e22ab0675175
-
Filesize
18KB
MD5482df92fbac57cd628c411930acc1be5
SHA172c1e39321c579358a456739df266277b1d16448
SHA256db60af6f42acb7f58ad8a9267c9b59eb31f943023d08c48c1a35907f9aab54bf
SHA5123976da093e141e0ca2caae12ed2317042b6ce402ccf897aac5b5a886ebd1e0dd94f80e9c19faed31ecdc49f1a522ed78a2f9b93c156ad0ca362aff3f7f1fc3e4
-
Filesize
534KB
MD57877fc84e5fad8018d10fedee3fd7b4e
SHA1ee58d0a7ee2db778d20bf292393696614443fefa
SHA2562a2e8ebc771d27fc3b32a7e059e1f9aa458324cb225ebea2b4bed0acd191e1be
SHA512ba5a3e9072876c89f1c2bb40e748fd6eb7ae0c9eb99756ab4bcd1bb5d5b1dedb1e517b0e3efd354cf3ed58bb3c49b8d365d340d95781b8eb8577e22ab0675175