Analysis
-
max time kernel
143s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe
Resource
win7-20220414-en
General
-
Target
bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe
-
Size
351KB
-
MD5
ce5ad18cc090c8a1405f084d9144671d
-
SHA1
67530a17331ad6477e4b25ef866412349791a3cb
-
SHA256
bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31
-
SHA512
66f3d07eb12c2a94f30fd37dadf832769fb87d10be3751f91ac474f4e72d86b535c5159f7fe2ac80500a844e9a7ace0db1d6dac69c1150475f03c207b9e8bc2a
Malware Config
Extracted
quasar
2.1.0.0
1
10.0.2.15:1337
VNM_MUTEX_28broDsmlFWTzx7r3B
-
encryption_key
0hi0YaDWMh7jhT37Tcsm
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x00060000000231c5-136.dat disable_win_def behavioral2/files/0x00060000000231c5-135.dat disable_win_def behavioral2/memory/4804-137-0x0000000000720000-0x00000000007AC000-memory.dmp disable_win_def -
Quasar Payload 3 IoCs
resource yara_rule behavioral2/files/0x00060000000231c5-136.dat family_quasar behavioral2/files/0x00060000000231c5-135.dat family_quasar behavioral2/memory/4804-137-0x0000000000720000-0x00000000007AC000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 1 IoCs
pid Process 4804 Iwpblky.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4816 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4804 Iwpblky.exe Token: SeDebugPrivilege 4804 Iwpblky.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4804 Iwpblky.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1540 wrote to memory of 4804 1540 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe 82 PID 1540 wrote to memory of 4804 1540 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe 82 PID 1540 wrote to memory of 4804 1540 bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe 82 PID 4804 wrote to memory of 4816 4804 Iwpblky.exe 85 PID 4804 wrote to memory of 4816 4804 Iwpblky.exe 85 PID 4804 wrote to memory of 4816 4804 Iwpblky.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe"C:\Users\Admin\AppData\Local\Temp\bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe"C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4816
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD57877fc84e5fad8018d10fedee3fd7b4e
SHA1ee58d0a7ee2db778d20bf292393696614443fefa
SHA2562a2e8ebc771d27fc3b32a7e059e1f9aa458324cb225ebea2b4bed0acd191e1be
SHA512ba5a3e9072876c89f1c2bb40e748fd6eb7ae0c9eb99756ab4bcd1bb5d5b1dedb1e517b0e3efd354cf3ed58bb3c49b8d365d340d95781b8eb8577e22ab0675175
-
Filesize
534KB
MD57877fc84e5fad8018d10fedee3fd7b4e
SHA1ee58d0a7ee2db778d20bf292393696614443fefa
SHA2562a2e8ebc771d27fc3b32a7e059e1f9aa458324cb225ebea2b4bed0acd191e1be
SHA512ba5a3e9072876c89f1c2bb40e748fd6eb7ae0c9eb99756ab4bcd1bb5d5b1dedb1e517b0e3efd354cf3ed58bb3c49b8d365d340d95781b8eb8577e22ab0675175