Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 07:37
Static task
static1
Behavioral task
behavioral1
Sample
545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe
Resource
win7-20220414-en
General
-
Target
545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe
-
Size
625KB
-
MD5
0ab869a3a06f47cd99e5164e76d0ed33
-
SHA1
19a4f343aeafa888b1b45e95f238ef537cbfe451
-
SHA256
545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80
-
SHA512
46987f55f6674a74606d2b106036d35b2c95b4ce4eceb3355132881fc9f730e4f1ef31d874ee1d271ddfb1ed0a21f665c99966a0c531b073fe3b42ad5bd1e0da
Malware Config
Extracted
quasar
2.1.0.0
1
10.0.2.15:1337
VNM_MUTEX_28broDsmlFWTzx7r3B
-
encryption_key
0hi0YaDWMh7jhT37Tcsm
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/files/0x000400000001e54f-138.dat disable_win_def behavioral2/files/0x000400000001e54f-139.dat disable_win_def behavioral2/memory/4832-140-0x0000000000B60000-0x0000000000BEC000-memory.dmp disable_win_def -
Quasar Payload 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000400000001e54f-138.dat family_quasar behavioral2/files/0x000400000001e54f-139.dat family_quasar behavioral2/memory/4832-140-0x0000000000B60000-0x0000000000BEC000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 2 IoCs
Processes:
Passwords.exeIwpblky.exepid Process 712 Passwords.exe 4832 Iwpblky.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exePasswords.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Passwords.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Iwpblky.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Iwpblky.exe\"" Iwpblky.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Iwpblky.exedescription pid Process Token: SeDebugPrivilege 4832 Iwpblky.exe Token: SeDebugPrivilege 4832 Iwpblky.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Iwpblky.exepid Process 4832 Iwpblky.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exePasswords.exeIwpblky.exedescription pid Process procid_target PID 3064 wrote to memory of 712 3064 545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe 80 PID 3064 wrote to memory of 712 3064 545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe 80 PID 3064 wrote to memory of 712 3064 545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe 80 PID 712 wrote to memory of 4832 712 Passwords.exe 84 PID 712 wrote to memory of 4832 712 Passwords.exe 84 PID 712 wrote to memory of 4832 712 Passwords.exe 84 PID 4832 wrote to memory of 5040 4832 Iwpblky.exe 86 PID 4832 wrote to memory of 5040 4832 Iwpblky.exe 86 PID 4832 wrote to memory of 5040 4832 Iwpblky.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe"C:\Users\Admin\AppData\Local\Temp\545d4b0dcf911ffdf44b5bf01dfef7be8421e05250806eb03ffb25e736961b80.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Passwords.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Passwords.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe"C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Defender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Iwpblky.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:5040
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD57877fc84e5fad8018d10fedee3fd7b4e
SHA1ee58d0a7ee2db778d20bf292393696614443fefa
SHA2562a2e8ebc771d27fc3b32a7e059e1f9aa458324cb225ebea2b4bed0acd191e1be
SHA512ba5a3e9072876c89f1c2bb40e748fd6eb7ae0c9eb99756ab4bcd1bb5d5b1dedb1e517b0e3efd354cf3ed58bb3c49b8d365d340d95781b8eb8577e22ab0675175
-
Filesize
534KB
MD57877fc84e5fad8018d10fedee3fd7b4e
SHA1ee58d0a7ee2db778d20bf292393696614443fefa
SHA2562a2e8ebc771d27fc3b32a7e059e1f9aa458324cb225ebea2b4bed0acd191e1be
SHA512ba5a3e9072876c89f1c2bb40e748fd6eb7ae0c9eb99756ab4bcd1bb5d5b1dedb1e517b0e3efd354cf3ed58bb3c49b8d365d340d95781b8eb8577e22ab0675175
-
Filesize
351KB
MD5ce5ad18cc090c8a1405f084d9144671d
SHA167530a17331ad6477e4b25ef866412349791a3cb
SHA256bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31
SHA51266f3d07eb12c2a94f30fd37dadf832769fb87d10be3751f91ac474f4e72d86b535c5159f7fe2ac80500a844e9a7ace0db1d6dac69c1150475f03c207b9e8bc2a
-
Filesize
351KB
MD5ce5ad18cc090c8a1405f084d9144671d
SHA167530a17331ad6477e4b25ef866412349791a3cb
SHA256bf79b08db6040f007e6ba07e7628388df2ab9f666e75b16e230d3e9d8600ab31
SHA51266f3d07eb12c2a94f30fd37dadf832769fb87d10be3751f91ac474f4e72d86b535c5159f7fe2ac80500a844e9a7ace0db1d6dac69c1150475f03c207b9e8bc2a