Analysis

  • max time kernel
    177s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 18:00

General

  • Target

    a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe

  • Size

    629KB

  • MD5

    4df6edc58b2aee8108bbf41a5281a0b3

  • SHA1

    372c881c85e6dd404ff65a086b0c7dd8e300ec19

  • SHA256

    a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

  • SHA512

    3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Windows Defender Security Host

C2

vilvaraj-32652.portmap.io:32652

Mutex

VNM_MUTEX_s1ArJSYbui8dt0HUpJ

Attributes
  • encryption_key

    8gl4TCjsLQUmqCIxalku

  • install_name

    Windows Defender Security Host.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Defender Security Host

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 9 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 9 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • suricata: ET MALWARE Common RAT Connectivity Check Observed

    suricata: ET MALWARE Common RAT Connectivity Check Observed

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe
    "C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe
      "C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe"
      2⤵
      • Loads dropped DLL
      • Windows security modification
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows Defender Security Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:456
      • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:968
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Windows Defender Security Host" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:280
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\gVO2Mfmrgx3e.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1620
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              6⤵
                PID:1724
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 10 localhost
                6⤵
                • Runs ping.exe
                PID:1232
              • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe
                "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:600
                • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1836
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 1508
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:2012
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1884
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          3⤵
            PID:1148
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
              4⤵
                PID:2032
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\jZ1U7pdeA38w.bat" "
              3⤵
                PID:1940
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  4⤵
                    PID:640
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 10 localhost
                    4⤵
                    • Runs ping.exe
                    PID:1100
                  • C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe
                    "C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe"
                    4⤵
                    • Suspicious use of SetThreadContext
                    PID:580
                    • C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe
                      "C:\Users\Admin\AppData\Local\Temp\a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c.exe"
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:948

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\gVO2Mfmrgx3e.bat

              Filesize

              231B

              MD5

              377b63bf10302dc3b20271427efdd657

              SHA1

              fa81d6ac514583c1dc4fbeebc72065c247373442

              SHA256

              be847136629e797bdb53055b024adbb5fd564b22926f63f7ca72bf3995340380

              SHA512

              14c019a55b687a8a7be6de962474856b1397c479135594e6cb17c26606719799f8242965ec1b126e50083803dbc943ccd7b9d71c5735e1d63f96ef99ceec59e6

            • C:\Users\Admin\AppData\Local\Temp\jZ1U7pdeA38w.bat

              Filesize

              261B

              MD5

              dda6438e0925e9f11fa1f34a1a8974cb

              SHA1

              93de00592a6b99323dd53da8703e81646666a723

              SHA256

              5ee26beb2dc50d5ac1c1f761521c650b6d30ce8ead87d9c4350cd468b0ef2419

              SHA512

              a55e406a861c27ce8bc12dc940390b941393a4fd6814c1619510950c3a1482448dfc14ffd1875059a4ea9d13fa5ed940b158474a5ff85d6e4b4850e11876643e

            • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • \Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • \Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • \Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • \Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • \Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • \Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • \Users\Admin\AppData\Roaming\SubDir\Windows Defender Security Host.exe

              Filesize

              629KB

              MD5

              4df6edc58b2aee8108bbf41a5281a0b3

              SHA1

              372c881c85e6dd404ff65a086b0c7dd8e300ec19

              SHA256

              a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c

              SHA512

              3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455

            • memory/280-90-0x0000000000000000-mapping.dmp

            • memory/456-69-0x0000000000000000-mapping.dmp

            • memory/580-124-0x0000000000000000-mapping.dmp

            • memory/600-103-0x0000000000000000-mapping.dmp

            • memory/640-122-0x0000000000000000-mapping.dmp

            • memory/948-131-0x0000000000486CAE-mapping.dmp

            • memory/968-83-0x0000000000486CAE-mapping.dmp

            • memory/1016-55-0x0000000075C51000-0x0000000075C53000-memory.dmp

              Filesize

              8KB

            • memory/1016-56-0x00000000003D0000-0x00000000003DA000-memory.dmp

              Filesize

              40KB

            • memory/1016-54-0x0000000001220000-0x00000000012C4000-memory.dmp

              Filesize

              656KB

            • memory/1100-123-0x0000000000000000-mapping.dmp

            • memory/1148-118-0x0000000000000000-mapping.dmp

            • memory/1232-100-0x0000000000000000-mapping.dmp

            • memory/1620-92-0x0000000000000000-mapping.dmp

            • memory/1724-95-0x0000000000000000-mapping.dmp

            • memory/1744-57-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1744-61-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1744-58-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1744-62-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1744-63-0x0000000000486CAE-mapping.dmp

            • memory/1744-65-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1744-60-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1744-67-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/1832-75-0x00000000010A0000-0x0000000001144000-memory.dmp

              Filesize

              656KB

            • memory/1832-71-0x0000000000000000-mapping.dmp

            • memory/1836-111-0x0000000000486CAE-mapping.dmp

            • memory/1884-101-0x000000006F420000-0x000000006F9CB000-memory.dmp

              Filesize

              5.7MB

            • memory/1884-74-0x0000000000000000-mapping.dmp

            • memory/1940-120-0x0000000000000000-mapping.dmp

            • memory/2012-94-0x0000000000000000-mapping.dmp

            • memory/2032-119-0x0000000000000000-mapping.dmp