Analysis
-
max time kernel
200s -
max time network
219s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 15:47
Static task
static1
Behavioral task
behavioral1
Sample
19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe
Resource
win7-20220414-en
General
-
Target
19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe
-
Size
610KB
-
MD5
783dde94a3c4fdad4663bc9e370e9de8
-
SHA1
262fa6fe51d779ae988d6b99ac8ee37d71c75064
-
SHA256
19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd
-
SHA512
a41f2f23272e55d9b275f868439758618f96c30fe47fd433431b07322f135fcbba3c43be199aba86160abe5e362e44ce9aa862bbf48cd0a33b716b278ec565b8
Malware Config
Extracted
quasar
2.1.0.0
svhost
myconect.ddns.net:6606
VNM_MUTEX_rHOHbrAQKctPD4d68w
-
encryption_key
rDFwhCyuKMqXO7llDpB2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 10 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe disable_win_def behavioral1/memory/1168-60-0x0000000000980000-0x0000000000A2A000-memory.dmp disable_win_def C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe disable_win_def \Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe disable_win_def \Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def behavioral1/memory/1636-70-0x0000000000930000-0x00000000009DA000-memory.dmp disable_win_def behavioral1/memory/756-84-0x00000000009E0000-0x0000000000A8A000-memory.dmp disable_win_def C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe disable_win_def -
Quasar Payload 10 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe family_quasar behavioral1/memory/1168-60-0x0000000000980000-0x0000000000A2A000-memory.dmp family_quasar C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe family_quasar \Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe family_quasar \Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral1/memory/1636-70-0x0000000000930000-0x00000000009DA000-memory.dmp family_quasar behavioral1/memory/756-84-0x00000000009E0000-0x0000000000A8A000-memory.dmp family_quasar C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 3 IoCs
Processes:
Pnabmtbcti.exeClient.exePnabmtbcti.exepid process 1168 Pnabmtbcti.exe 1636 Client.exe 756 Pnabmtbcti.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 428 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exePnabmtbcti.execmd.exepid process 1416 19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe 1168 Pnabmtbcti.exe 1976 cmd.exe -
Processes:
Pnabmtbcti.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features Pnabmtbcti.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Pnabmtbcti.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Client.exePnabmtbcti.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Venom Client Startup = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Venom Client Startup = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Pnabmtbcti.exe\"" Pnabmtbcti.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
Pnabmtbcti.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Pnabmtbcti.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde Pnabmtbcti.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exePnabmtbcti.exepid process 1708 powershell.exe 1168 Pnabmtbcti.exe 1168 Pnabmtbcti.exe 1168 Pnabmtbcti.exe 1168 Pnabmtbcti.exe 1168 Pnabmtbcti.exe 1168 Pnabmtbcti.exe 1168 Pnabmtbcti.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Pnabmtbcti.exeClient.exepowershell.exedescription pid process Token: SeDebugPrivilege 1168 Pnabmtbcti.exe Token: SeDebugPrivilege 1636 Client.exe Token: SeDebugPrivilege 1636 Client.exe Token: SeDebugPrivilege 1708 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 880 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 1636 Client.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exePnabmtbcti.exeClient.execmd.execmd.exedescription pid process target process PID 1416 wrote to memory of 1168 1416 19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe Pnabmtbcti.exe PID 1416 wrote to memory of 1168 1416 19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe Pnabmtbcti.exe PID 1416 wrote to memory of 1168 1416 19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe Pnabmtbcti.exe PID 1416 wrote to memory of 1168 1416 19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe Pnabmtbcti.exe PID 1168 wrote to memory of 524 1168 Pnabmtbcti.exe schtasks.exe PID 1168 wrote to memory of 524 1168 Pnabmtbcti.exe schtasks.exe PID 1168 wrote to memory of 524 1168 Pnabmtbcti.exe schtasks.exe PID 1168 wrote to memory of 524 1168 Pnabmtbcti.exe schtasks.exe PID 1168 wrote to memory of 1636 1168 Pnabmtbcti.exe Client.exe PID 1168 wrote to memory of 1636 1168 Pnabmtbcti.exe Client.exe PID 1168 wrote to memory of 1636 1168 Pnabmtbcti.exe Client.exe PID 1168 wrote to memory of 1636 1168 Pnabmtbcti.exe Client.exe PID 1168 wrote to memory of 1708 1168 Pnabmtbcti.exe powershell.exe PID 1168 wrote to memory of 1708 1168 Pnabmtbcti.exe powershell.exe PID 1168 wrote to memory of 1708 1168 Pnabmtbcti.exe powershell.exe PID 1168 wrote to memory of 1708 1168 Pnabmtbcti.exe powershell.exe PID 1636 wrote to memory of 1692 1636 Client.exe schtasks.exe PID 1636 wrote to memory of 1692 1636 Client.exe schtasks.exe PID 1636 wrote to memory of 1692 1636 Client.exe schtasks.exe PID 1636 wrote to memory of 1692 1636 Client.exe schtasks.exe PID 1168 wrote to memory of 1188 1168 Pnabmtbcti.exe cmd.exe PID 1168 wrote to memory of 1188 1168 Pnabmtbcti.exe cmd.exe PID 1168 wrote to memory of 1188 1168 Pnabmtbcti.exe cmd.exe PID 1168 wrote to memory of 1188 1168 Pnabmtbcti.exe cmd.exe PID 1188 wrote to memory of 428 1188 cmd.exe cmd.exe PID 1188 wrote to memory of 428 1188 cmd.exe cmd.exe PID 1188 wrote to memory of 428 1188 cmd.exe cmd.exe PID 1188 wrote to memory of 428 1188 cmd.exe cmd.exe PID 1168 wrote to memory of 1976 1168 Pnabmtbcti.exe cmd.exe PID 1168 wrote to memory of 1976 1168 Pnabmtbcti.exe cmd.exe PID 1168 wrote to memory of 1976 1168 Pnabmtbcti.exe cmd.exe PID 1168 wrote to memory of 1976 1168 Pnabmtbcti.exe cmd.exe PID 1976 wrote to memory of 1064 1976 cmd.exe chcp.com PID 1976 wrote to memory of 1064 1976 cmd.exe chcp.com PID 1976 wrote to memory of 1064 1976 cmd.exe chcp.com PID 1976 wrote to memory of 1064 1976 cmd.exe chcp.com PID 1976 wrote to memory of 1216 1976 cmd.exe PING.EXE PID 1976 wrote to memory of 1216 1976 cmd.exe PING.EXE PID 1976 wrote to memory of 1216 1976 cmd.exe PING.EXE PID 1976 wrote to memory of 1216 1976 cmd.exe PING.EXE PID 1976 wrote to memory of 756 1976 cmd.exe Pnabmtbcti.exe PID 1976 wrote to memory of 756 1976 cmd.exe Pnabmtbcti.exe PID 1976 wrote to memory of 756 1976 cmd.exe Pnabmtbcti.exe PID 1976 wrote to memory of 756 1976 cmd.exe Pnabmtbcti.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe"C:\Users\Admin\AppData\Local\Temp\19f0abf0648c4c993b02b50b4e35224b64ff45b9748dd9dc36c68cf1b42dcbdd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe"C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:524
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1692
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- Deletes itself
PID:428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5n2ZuncUUeIt.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1064
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe"C:\Users\Admin\AppData\Local\Temp\Pnabmtbcti.exe"4⤵
- Executes dropped EXE
PID:756
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5f8f6df614c64ecb3f9dce5e9de562b4f
SHA1102abca916bca7f4f02e374db9198c58d15e9ab3
SHA2560a79ccb24f4cd75aaf55cc44bec96afb296140ea449fbd053b89d7acd3779d83
SHA512e3101e26ec61826f7a19a05f8e1462bb9cdf3b8f8c9e4e6725cfa3f735457a4e08f3309b21d4d42981d217578dfcfb8d2ea97b254800303eb0a2b66a079cf52e
-
Filesize
72KB
MD5277f0e029298e0dffee3f8820726c6e3
SHA1df2cdaa12ccc9e0eb0de1871c9fa12cec9f575a2
SHA256f7ede3780d2e6789dfd5aaf99d8613040e6150f44ab547116817dc2f7ad442a8
SHA512b2fc83d2e4d682007109be8b33aff144af3ad8f6466b911c6f48516fde5530234ed964d12a82e1e10a4a79130ee59fdc2076106d4f7460e036cdd0454da90272
-
Filesize
655KB
MD543e5556cab3ba9cd353b0c6cf1548d75
SHA164cf51c0d612cb6276e59639071406c1d2e86702
SHA256286ea33997e28cad2651bc27c091e45c3502c4c7f69e4f28965bf846cf9528b8
SHA512edde4a5af40e65afbe4e212e356879277f9641e4b8d46950fed33397754fe87ff81a337623e6c5202776e1636cefcd58f0ed94a212e8dd25ba427a017fcb2bdf
-
Filesize
655KB
MD543e5556cab3ba9cd353b0c6cf1548d75
SHA164cf51c0d612cb6276e59639071406c1d2e86702
SHA256286ea33997e28cad2651bc27c091e45c3502c4c7f69e4f28965bf846cf9528b8
SHA512edde4a5af40e65afbe4e212e356879277f9641e4b8d46950fed33397754fe87ff81a337623e6c5202776e1636cefcd58f0ed94a212e8dd25ba427a017fcb2bdf
-
Filesize
526KB
MD5f2289426aed1178a239226474524eac5
SHA11c60e6d699cb6016a57875a577f1d7ff6114f0c8
SHA256bbf9eb424c58cce104b194cf75dbbfb4f33c22392ca17abbf03d06c2675eb941
SHA512b5c0f67c5e78dfd52883c7418e317075b6fdfdb798aac02e0051a1b27fde527503d96044868c0d9399d651479e23135745a900f60f90d96750dcd41f70275867
-
Filesize
655KB
MD543e5556cab3ba9cd353b0c6cf1548d75
SHA164cf51c0d612cb6276e59639071406c1d2e86702
SHA256286ea33997e28cad2651bc27c091e45c3502c4c7f69e4f28965bf846cf9528b8
SHA512edde4a5af40e65afbe4e212e356879277f9641e4b8d46950fed33397754fe87ff81a337623e6c5202776e1636cefcd58f0ed94a212e8dd25ba427a017fcb2bdf
-
Filesize
655KB
MD543e5556cab3ba9cd353b0c6cf1548d75
SHA164cf51c0d612cb6276e59639071406c1d2e86702
SHA256286ea33997e28cad2651bc27c091e45c3502c4c7f69e4f28965bf846cf9528b8
SHA512edde4a5af40e65afbe4e212e356879277f9641e4b8d46950fed33397754fe87ff81a337623e6c5202776e1636cefcd58f0ed94a212e8dd25ba427a017fcb2bdf
-
Filesize
655KB
MD543e5556cab3ba9cd353b0c6cf1548d75
SHA164cf51c0d612cb6276e59639071406c1d2e86702
SHA256286ea33997e28cad2651bc27c091e45c3502c4c7f69e4f28965bf846cf9528b8
SHA512edde4a5af40e65afbe4e212e356879277f9641e4b8d46950fed33397754fe87ff81a337623e6c5202776e1636cefcd58f0ed94a212e8dd25ba427a017fcb2bdf
-
Filesize
477KB
MD596d21b43b0db6c701dd6c9080d15ecf0
SHA11f1c7460438e15f426f48713a314cdaaf6427e5a
SHA2568074f918596359316353060f3bfd8bc9b2b319e527f643bfb5bd56527cafc065
SHA512c314c5ce1851d8e5a26fe7849f197459bdd3b36f29375a9b5845c2c0a6a949478699ac5fbe56b0c2489fe6a176bb7891852f22e9530f50bcdc1278ce17a7e1ef
-
Filesize
655KB
MD543e5556cab3ba9cd353b0c6cf1548d75
SHA164cf51c0d612cb6276e59639071406c1d2e86702
SHA256286ea33997e28cad2651bc27c091e45c3502c4c7f69e4f28965bf846cf9528b8
SHA512edde4a5af40e65afbe4e212e356879277f9641e4b8d46950fed33397754fe87ff81a337623e6c5202776e1636cefcd58f0ed94a212e8dd25ba427a017fcb2bdf