Analysis
-
max time kernel
169s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 01:04
Static task
static1
Behavioral task
behavioral1
Sample
e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe
Resource
win7-20220414-en
General
-
Target
e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe
-
Size
303KB
-
MD5
a500424ebd54b1e006ccad65266562e3
-
SHA1
18be3591da1c3d79aee29026c30c67567e3b2bad
-
SHA256
e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c
-
SHA512
c197f02534c15b82f81def7d60349fba1e72c0b82d8b11fe64856a7ae7833e9d9d70d723bac8e1809ceda2cc9c76eb87025199230ba08ebc89bde2f6b71931ec
Malware Config
Extracted
quasar
2.1.0.0
Office04
myconect.ddns.net:6606
VNM_MUTEX_bW2Pm17MwUNvIYeCrf
-
encryption_key
skMcIyTXgvAaYya6lzLD
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x0006000000022ef0-135.dat disable_win_def behavioral2/files/0x0006000000022ef0-136.dat disable_win_def behavioral2/memory/232-137-0x00000000006D0000-0x000000000075C000-memory.dmp disable_win_def -
Quasar Payload 3 IoCs
resource yara_rule behavioral2/files/0x0006000000022ef0-135.dat family_quasar behavioral2/files/0x0006000000022ef0-136.dat family_quasar behavioral2/memory/232-137-0x00000000006D0000-0x000000000075C000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 1 IoCs
pid Process 232 uq1zr4nx.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 216 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe Token: SeDebugPrivilege 216 taskkill.exe Token: SeDebugPrivilege 232 uq1zr4nx.exe Token: SeDebugPrivilege 232 uq1zr4nx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1276 wrote to memory of 4704 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 83 PID 1276 wrote to memory of 4704 1276 e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe 83 PID 3916 wrote to memory of 232 3916 cmd.exe 87 PID 3916 wrote to memory of 232 3916 cmd.exe 87 PID 3916 wrote to memory of 232 3916 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe"C:\Users\Admin\AppData\Local\Temp\e4b0894af3fb7948dd92288339cf2fda627c26ec25b4d37c1620f6c005c0c01c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\windows\system32\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\04pkxry1.inf2⤵PID:4704
-
-
C:\Windows\system32\cmd.execmd /c start C:\Windows\temp\uq1zr4nx.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\temp\uq1zr4nx.exeC:\Windows\temp\uq1zr4nx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Windows\system32\taskkill.exetaskkill /IM cmstp.exe /F1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD5e4dc9cb250120aebeee969906d1a7a22
SHA1c0f9d3a2531cc25e212d9adbf8614903d8a6247e
SHA25614de179b37e9958b3a1d22f22b0bb545be1cb166aeaf5a4892ccd616ee7e544f
SHA51221461e4fdc16ba99ae24a1f2fa39465678e851591d7402c762a04bf286b9ec8230a0acd147f0c9d54fb6a3428be1851c4d75f46b6cf917a44b3b399e8897667b
-
Filesize
606B
MD5b38d4204db95fc14008e54f741078a6e
SHA16b18b1c38b2b8c6a20899ff833ede43546863209
SHA25622e14598fe5afb437da081712974bb3bd94f5e0dbfe6139384ae02d9b5afe3ae
SHA512f07c836f543a5ef0c89a67499a38958bfa080c95dae8137bde4bfab5e4772fd0de508f6a9c3995f0dd9f4475c756ea86d4db8acb0af6df82ead06c0e8db410d8
-
Filesize
534KB
MD5e4dc9cb250120aebeee969906d1a7a22
SHA1c0f9d3a2531cc25e212d9adbf8614903d8a6247e
SHA25614de179b37e9958b3a1d22f22b0bb545be1cb166aeaf5a4892ccd616ee7e544f
SHA51221461e4fdc16ba99ae24a1f2fa39465678e851591d7402c762a04bf286b9ec8230a0acd147f0c9d54fb6a3428be1851c4d75f46b6cf917a44b3b399e8897667b