Analysis
-
max time kernel
54s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 11:56
Static task
static1
Behavioral task
behavioral1
Sample
995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe
Resource
win7-20220414-en
General
-
Target
995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe
-
Size
600KB
-
MD5
38842bfc2ef9e1a4734a3ac4d4fa0b0d
-
SHA1
d7702f8f8b6d8baa46c066948b8278bfe868cff5
-
SHA256
995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824
-
SHA512
067a32950f8800f2ab64d80c6910abf20e0204457abca4156a5a93624c230720b7904fe48ef26ab2ea15958abdb8a53306513c4db74ca69f02de679c5c360346
Malware Config
Extracted
quasar
2.1.0.0
windows security
vilvaraj-32652.portmap.io:32652
VNM_MUTEX_XaCO2YtLAsadylDHBP
-
encryption_key
eKgGUbCubcSIafuOAN5V
-
install_name
windows security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
windows security
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/5036-135-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def -
Quasar Payload 1 IoCs
resource yara_rule behavioral2/memory/5036-135-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar -
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
-
Executes dropped EXE 2 IoCs
pid Process 4232 windows security.exe 4340 windows security.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation windows security.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Update Folder\\Windows Update.exe" 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows security = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\windows security.exe\"" windows security.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com 7 api.ipify.org 16 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2736 set thread context of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 4232 set thread context of 4340 4232 windows security.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2500 4340 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe 2480 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1776 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4452 powershell.exe 4452 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 4340 windows security.exe Token: SeDebugPrivilege 4340 windows security.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4340 windows security.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 2736 wrote to memory of 5036 2736 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 82 PID 5036 wrote to memory of 1780 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 83 PID 5036 wrote to memory of 1780 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 83 PID 5036 wrote to memory of 1780 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 83 PID 5036 wrote to memory of 4232 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 85 PID 5036 wrote to memory of 4232 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 85 PID 5036 wrote to memory of 4232 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 85 PID 5036 wrote to memory of 4452 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 86 PID 5036 wrote to memory of 4452 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 86 PID 5036 wrote to memory of 4452 5036 995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe 86 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4232 wrote to memory of 4340 4232 windows security.exe 88 PID 4340 wrote to memory of 2480 4340 windows security.exe 90 PID 4340 wrote to memory of 2480 4340 windows security.exe 90 PID 4340 wrote to memory of 2480 4340 windows security.exe 90 PID 4340 wrote to memory of 3868 4340 windows security.exe 92 PID 4340 wrote to memory of 3868 4340 windows security.exe 92 PID 4340 wrote to memory of 3868 4340 windows security.exe 92 PID 3868 wrote to memory of 1628 3868 cmd.exe 95 PID 3868 wrote to memory of 1628 3868 cmd.exe 95 PID 3868 wrote to memory of 1628 3868 cmd.exe 95 PID 3868 wrote to memory of 1776 3868 cmd.exe 97 PID 3868 wrote to memory of 1776 3868 cmd.exe 97 PID 3868 wrote to memory of 1776 3868 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe"C:\Users\Admin\AppData\Local\Temp\995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe"C:\Users\Admin\AppData\Local\Temp\995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe"2⤵
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "windows security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1780
-
-
C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "windows security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GxIBqO0Bjx5t.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:1628
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:1776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 22245⤵
- Program crash
PID:2500
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4340 -ip 43401⤵PID:3080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824.exe.log
Filesize507B
MD58cf94b5356be60247d331660005941ec
SHA1fdedb361f40f22cb6a086c808fc0056d4e421131
SHA25652a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0
SHA512b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651
-
Filesize
507B
MD58cf94b5356be60247d331660005941ec
SHA1fdedb361f40f22cb6a086c808fc0056d4e421131
SHA25652a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0
SHA512b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651
-
Filesize
217B
MD5a143fc184a75653dc3388e9fdb4cd2f4
SHA15d8449084f74a31fbdbd734eb145b6760050ff3d
SHA2568235ca10580b9cd0323cd23e7ae33b4e93334e6315d3402180365ff2d553e7a6
SHA5128c10b85779e45df9aa5c195b2099a55bb041f91b3c5fc088803e188df19fdd8d4f03f5038f549cb70ba5041adcc6b67fb511b2497141ca3871ce46e6acc25759
-
Filesize
600KB
MD538842bfc2ef9e1a4734a3ac4d4fa0b0d
SHA1d7702f8f8b6d8baa46c066948b8278bfe868cff5
SHA256995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824
SHA512067a32950f8800f2ab64d80c6910abf20e0204457abca4156a5a93624c230720b7904fe48ef26ab2ea15958abdb8a53306513c4db74ca69f02de679c5c360346
-
Filesize
600KB
MD538842bfc2ef9e1a4734a3ac4d4fa0b0d
SHA1d7702f8f8b6d8baa46c066948b8278bfe868cff5
SHA256995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824
SHA512067a32950f8800f2ab64d80c6910abf20e0204457abca4156a5a93624c230720b7904fe48ef26ab2ea15958abdb8a53306513c4db74ca69f02de679c5c360346
-
Filesize
600KB
MD538842bfc2ef9e1a4734a3ac4d4fa0b0d
SHA1d7702f8f8b6d8baa46c066948b8278bfe868cff5
SHA256995661538199d5b1f816b33bf4a5b0dc50840e054a14dc54189aa63db3b6b824
SHA512067a32950f8800f2ab64d80c6910abf20e0204457abca4156a5a93624c230720b7904fe48ef26ab2ea15958abdb8a53306513c4db74ca69f02de679c5c360346