Analysis
-
max time kernel
145s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe
Resource
win7-20220414-en
General
-
Target
f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe
-
Size
557KB
-
MD5
f84217da36243f2f84ac59ef8b7a335c
-
SHA1
0db32208d2c6c43caa2c5f7030812521a749e91f
-
SHA256
f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1
-
SHA512
d247f517e8cf1cc93170b8c38c9a95e1797669478f7f7d65f9e13f3ff66b5995557ab86abb763a7208517a8033e4a708fca241d2f1ef257fadcedd6a73c7edd4
Malware Config
Extracted
quasar
2.1.0.0
Office04
127.0.0.1:4782
VNM_MUTEX_iRne81OIv7xHkBnmxo
-
encryption_key
btGyLN1mMyjkKPSibgiM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/files/0x000a0000000122ee-56.dat disable_win_def behavioral1/files/0x000a0000000122ee-58.dat disable_win_def behavioral1/files/0x000a0000000122ee-59.dat disable_win_def behavioral1/memory/1100-60-0x0000000000390000-0x0000000000446000-memory.dmp disable_win_def -
Quasar Payload 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a0000000122ee-56.dat family_quasar behavioral1/files/0x000a0000000122ee-58.dat family_quasar behavioral1/files/0x000a0000000122ee-59.dat family_quasar behavioral1/memory/1100-60-0x0000000000390000-0x0000000000446000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 1 IoCs
Processes:
Qparrgldtgy.exepid Process 1100 Qparrgldtgy.exe -
Loads dropped DLL 1 IoCs
Processes:
f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exepid Process 1736 f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Qparrgldtgy.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Venom Client Startup = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Qparrgldtgy.exe\"" Qparrgldtgy.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Qparrgldtgy.exedescription pid Process Token: SeDebugPrivilege 1100 Qparrgldtgy.exe Token: SeDebugPrivilege 1100 Qparrgldtgy.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Qparrgldtgy.exepid Process 1100 Qparrgldtgy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exeQparrgldtgy.exedescription pid Process procid_target PID 1736 wrote to memory of 1100 1736 f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe 28 PID 1736 wrote to memory of 1100 1736 f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe 28 PID 1736 wrote to memory of 1100 1736 f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe 28 PID 1736 wrote to memory of 1100 1736 f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe 28 PID 1100 wrote to memory of 1152 1100 Qparrgldtgy.exe 30 PID 1100 wrote to memory of 1152 1100 Qparrgldtgy.exe 30 PID 1100 wrote to memory of 1152 1100 Qparrgldtgy.exe 30 PID 1100 wrote to memory of 1152 1100 Qparrgldtgy.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe"C:\Users\Admin\AppData\Local\Temp\f43704733fbb8efbc457bb922c529df7e358cd26f7d99f0ec4c4cbb748d816d1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Qparrgldtgy.exe"C:\Users\Admin\AppData\Local\Temp\Qparrgldtgy.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Qparrgldtgy.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1152
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD5228c70c1f3f7931565e579dfa23c9d16
SHA136b022abebcf57a83a1984d824e3d1046dc7bf31
SHA256f853198fd10c73b320de1723a25dd35d17f61a0afde46f8e3a9a85efde306656
SHA512a35a7168426d882a3f1e27948d2854ddfaa9f9fdc91c6cafeef7defbb74b608ce3d21dacf9fe3013483efe3fd861202a6c4f275f051604bd92d52cd588961097
-
Filesize
702KB
MD5228c70c1f3f7931565e579dfa23c9d16
SHA136b022abebcf57a83a1984d824e3d1046dc7bf31
SHA256f853198fd10c73b320de1723a25dd35d17f61a0afde46f8e3a9a85efde306656
SHA512a35a7168426d882a3f1e27948d2854ddfaa9f9fdc91c6cafeef7defbb74b608ce3d21dacf9fe3013483efe3fd861202a6c4f275f051604bd92d52cd588961097
-
Filesize
702KB
MD5228c70c1f3f7931565e579dfa23c9d16
SHA136b022abebcf57a83a1984d824e3d1046dc7bf31
SHA256f853198fd10c73b320de1723a25dd35d17f61a0afde46f8e3a9a85efde306656
SHA512a35a7168426d882a3f1e27948d2854ddfaa9f9fdc91c6cafeef7defbb74b608ce3d21dacf9fe3013483efe3fd861202a6c4f275f051604bd92d52cd588961097