Analysis

  • max time kernel
    111s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-05-2022 11:56

General

  • Target

    0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe

  • Size

    602KB

  • MD5

    f78e8fdb5c76c784818c1ea7ba8217cd

  • SHA1

    9a3ca4ab923d8b93b49f5d46c6b449845ca94c6d

  • SHA256

    0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c

  • SHA512

    9fc70809bac9189e693af1ccd10f35af84fe295b048ed609262a90bf071157b0a23ff2672c57f424fbcd56fc816c1400b6a9a09cd30e12619d785518151d62b3

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

windows security

C2

vilvaraj-32652.portmap.io:32652

Mutex

VNM_MUTEX_XaCO2YtLAsadylDHBP

Attributes
  • encryption_key

    eKgGUbCubcSIafuOAN5V

  • install_name

    windows security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    windows security

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Quasar Payload 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3

    suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe
    "C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe
      "C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe"
      2⤵
        PID:392
      • C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe
        "C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe"
        2⤵
        • Checks computer location settings
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3440
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "windows security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe" /rl HIGHEST /f
          3⤵
          • Creates scheduled task(s)
          PID:4392
        • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4464
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "windows security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe" /rl HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:228
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2HYjJTsxty4Y.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2624
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                6⤵
                  PID:2568
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • Runs ping.exe
                  PID:552
                • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3976
                  • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe
                    "C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1988
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 2236
                5⤵
                • Program crash
                PID:3132
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Get-MpPreference -verbose
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4600
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2744
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
              4⤵
                PID:4468
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\w8gknXP5O8RJ.bat" "
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2340
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                4⤵
                  PID:4836
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  4⤵
                  • Runs ping.exe
                  PID:4072
                • C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe
                  "C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe"
                  4⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:2840
                  • C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe
                    "C:\Users\Admin\AppData\Local\Temp\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe"
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2232
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4464 -ip 4464
            1⤵
              PID:4532

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c.exe.log

              Filesize

              507B

              MD5

              8cf94b5356be60247d331660005941ec

              SHA1

              fdedb361f40f22cb6a086c808fc0056d4e421131

              SHA256

              52a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0

              SHA512

              b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windows security.exe.log

              Filesize

              507B

              MD5

              8cf94b5356be60247d331660005941ec

              SHA1

              fdedb361f40f22cb6a086c808fc0056d4e421131

              SHA256

              52a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0

              SHA512

              b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651

            • C:\Users\Admin\AppData\Local\Temp\2HYjJTsxty4Y.bat

              Filesize

              217B

              MD5

              a68781c72bbc48232457dabc373f02f6

              SHA1

              167be0ea0e79e68cfb7ad260cf2b6fcbcbcd1f20

              SHA256

              0f8914f370f636d63eac55489a1556e295df0ba273225b7ba3d40a39bdd18888

              SHA512

              6959f0594c93dfbd2f6ddb9c82d4cbdc82709ab882e29f1579c6f983ad364c8fdd7c791536f1f0eeb06f53c29537558f07b4ed233cff56c35ef21048eb9e9e19

            • C:\Users\Admin\AppData\Local\Temp\w8gknXP5O8RJ.bat

              Filesize

              261B

              MD5

              6f9445b7322451725f99c88b93defa6a

              SHA1

              a5c2f3e418975f292b84642749e7636d1f6955f0

              SHA256

              a052426f3bf0996fabe78dd3025063cdc8ab13c7f509cb606713c9cb132e7984

              SHA512

              63bff403b4e8b45de7c67c87816b045784d00e79450eaa0151e0496ecd7512c5b96adf0c94e01e4d55178edde5fc1f4fa9173b4a9f92ebe7db923d5eb35fd1da

            • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe

              Filesize

              602KB

              MD5

              f78e8fdb5c76c784818c1ea7ba8217cd

              SHA1

              9a3ca4ab923d8b93b49f5d46c6b449845ca94c6d

              SHA256

              0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c

              SHA512

              9fc70809bac9189e693af1ccd10f35af84fe295b048ed609262a90bf071157b0a23ff2672c57f424fbcd56fc816c1400b6a9a09cd30e12619d785518151d62b3

            • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe

              Filesize

              602KB

              MD5

              f78e8fdb5c76c784818c1ea7ba8217cd

              SHA1

              9a3ca4ab923d8b93b49f5d46c6b449845ca94c6d

              SHA256

              0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c

              SHA512

              9fc70809bac9189e693af1ccd10f35af84fe295b048ed609262a90bf071157b0a23ff2672c57f424fbcd56fc816c1400b6a9a09cd30e12619d785518151d62b3

            • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe

              Filesize

              602KB

              MD5

              f78e8fdb5c76c784818c1ea7ba8217cd

              SHA1

              9a3ca4ab923d8b93b49f5d46c6b449845ca94c6d

              SHA256

              0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c

              SHA512

              9fc70809bac9189e693af1ccd10f35af84fe295b048ed609262a90bf071157b0a23ff2672c57f424fbcd56fc816c1400b6a9a09cd30e12619d785518151d62b3

            • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe

              Filesize

              602KB

              MD5

              f78e8fdb5c76c784818c1ea7ba8217cd

              SHA1

              9a3ca4ab923d8b93b49f5d46c6b449845ca94c6d

              SHA256

              0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c

              SHA512

              9fc70809bac9189e693af1ccd10f35af84fe295b048ed609262a90bf071157b0a23ff2672c57f424fbcd56fc816c1400b6a9a09cd30e12619d785518151d62b3

            • C:\Users\Admin\AppData\Roaming\SubDir\windows security.exe

              Filesize

              602KB

              MD5

              f78e8fdb5c76c784818c1ea7ba8217cd

              SHA1

              9a3ca4ab923d8b93b49f5d46c6b449845ca94c6d

              SHA256

              0e0a586e4c7a3d6508de4cffe0c78050c01dda128441853127ef10e1e3c7e25c

              SHA512

              9fc70809bac9189e693af1ccd10f35af84fe295b048ed609262a90bf071157b0a23ff2672c57f424fbcd56fc816c1400b6a9a09cd30e12619d785518151d62b3

            • memory/2656-131-0x0000000005A80000-0x0000000006024000-memory.dmp

              Filesize

              5.6MB

            • memory/2656-130-0x0000000000910000-0x00000000009AC000-memory.dmp

              Filesize

              624KB

            • memory/2656-132-0x00000000053F0000-0x0000000005482000-memory.dmp

              Filesize

              584KB

            • memory/2656-133-0x00000000054D0000-0x000000000556C000-memory.dmp

              Filesize

              624KB

            • memory/3440-138-0x00000000062A0000-0x00000000062B2000-memory.dmp

              Filesize

              72KB

            • memory/3440-137-0x0000000005630000-0x0000000005696000-memory.dmp

              Filesize

              408KB

            • memory/3440-136-0x0000000000400000-0x000000000048C000-memory.dmp

              Filesize

              560KB

            • memory/4464-166-0x00000000064A0000-0x00000000064AA000-memory.dmp

              Filesize

              40KB

            • memory/4600-154-0x000000006FB80000-0x000000006FBCC000-memory.dmp

              Filesize

              304KB

            • memory/4600-161-0x0000000007730000-0x000000000774A000-memory.dmp

              Filesize

              104KB

            • memory/4600-160-0x0000000007620000-0x000000000762E000-memory.dmp

              Filesize

              56KB

            • memory/4600-159-0x0000000007670000-0x0000000007706000-memory.dmp

              Filesize

              600KB

            • memory/4600-158-0x0000000007460000-0x000000000746A000-memory.dmp

              Filesize

              40KB

            • memory/4600-147-0x0000000004B30000-0x0000000004B66000-memory.dmp

              Filesize

              216KB

            • memory/4600-157-0x00000000073F0000-0x000000000740A000-memory.dmp

              Filesize

              104KB

            • memory/4600-156-0x0000000007A30000-0x00000000080AA000-memory.dmp

              Filesize

              6.5MB

            • memory/4600-162-0x0000000007710000-0x0000000007718000-memory.dmp

              Filesize

              32KB

            • memory/4600-155-0x0000000006680000-0x000000000669E000-memory.dmp

              Filesize

              120KB

            • memory/4600-153-0x00000000070B0000-0x00000000070E2000-memory.dmp

              Filesize

              200KB

            • memory/4600-152-0x00000000060D0000-0x00000000060EE000-memory.dmp

              Filesize

              120KB

            • memory/4600-151-0x0000000005AF0000-0x0000000005B56000-memory.dmp

              Filesize

              408KB

            • memory/4600-150-0x0000000005950000-0x0000000005972000-memory.dmp

              Filesize

              136KB

            • memory/4600-149-0x00000000051D0000-0x00000000057F8000-memory.dmp

              Filesize

              6.2MB