Analysis

  • max time kernel
    131s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-05-2022 12:58

General

  • Target

    5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe

  • Size

    9.0MB

  • MD5

    987bb8bcc92a914d249989e8cca3b2e9

  • SHA1

    d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26

  • SHA256

    5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094

  • SHA512

    23d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Business

C2

craft.ooguy.com:1981

Mutex

GpDg1xgoq8qb9M6Jp6

Attributes
  • encryption_key

    bJJpHxbw80umglURXtYY

  • install_name

    Client.exe

  • log_directory

    4k

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar Payload 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • suricata: ET MALWARE Common RAT Connectivity Check Observed

    suricata: ET MALWARE Common RAT Connectivity Check Observed

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe
    "C:\Users\Admin\AppData\Local\Temp\5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /query
      2⤵
        PID:1992
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks.exe" /create /sc MINUTE /tn FoxitPhantomPDF /MO 1 /tr C:\Users\Admin\AppData\Roaming\FoxitPhantom
        2⤵
        • Creates scheduled task(s)
        PID:1988
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1764
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\dBR0ZGr9Swsb.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1480
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            4⤵
              PID:804
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              4⤵
              • Runs ping.exe
              PID:1200
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
                PID:1368
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 1512
              3⤵
              • Program crash
              PID:1900
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {FB47E086-E0E0-4AF0-975C-69E7D3CE0B55} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1836
          • C:\Users\Admin\AppData\Roaming\FoxitPhantom
            C:\Users\Admin\AppData\Roaming\FoxitPhantom
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:748
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks.exe" /query
              3⤵
                PID:1060
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                  PID:1612
              • C:\Users\Admin\AppData\Roaming\FoxitPhantom
                C:\Users\Admin\AppData\Roaming\FoxitPhantom
                2⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1588
                • C:\Windows\SysWOW64\schtasks.exe
                  "schtasks.exe" /query
                  3⤵
                    PID:1736

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Discovery

              System Information Discovery

              1
              T1082

              Remote System Discovery

              1
              T1018

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\dBR0ZGr9Swsb.bat
                Filesize

                215B

                MD5

                c7a32209b4a3ec4863a1a781daa1a6f4

                SHA1

                2dbf9ddc87670fd6c4bfdb2d255ecf76a8723538

                SHA256

                31c31c549f0d3cd35e43ef170fdea7dc430ce81bacd23b71c014f8ccc167184d

                SHA512

                fe9edab4ac78b904017a11f81383544719dd39722daba38ad256a7a475a09f39be4c59f4ad474c4fd1f6b989d2a5534b112230a81ef08cd493d068df3d0cd91c

              • C:\Users\Admin\AppData\Roaming\FoxitPhantom
                Filesize

                9.0MB

                MD5

                987bb8bcc92a914d249989e8cca3b2e9

                SHA1

                d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26

                SHA256

                5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094

                SHA512

                23d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd

              • C:\Users\Admin\AppData\Roaming\FoxitPhantom
                Filesize

                9.0MB

                MD5

                987bb8bcc92a914d249989e8cca3b2e9

                SHA1

                d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26

                SHA256

                5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094

                SHA512

                23d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd

              • C:\Users\Admin\AppData\Roaming\FoxitPhantom
                Filesize

                9.0MB

                MD5

                987bb8bcc92a914d249989e8cca3b2e9

                SHA1

                d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26

                SHA256

                5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094

                SHA512

                23d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd

              • memory/748-74-0x0000000000C30000-0x0000000001534000-memory.dmp
                Filesize

                9.0MB

              • memory/748-72-0x0000000000000000-mapping.dmp
              • memory/804-66-0x0000000000000000-mapping.dmp
              • memory/1060-76-0x0000000000000000-mapping.dmp
              • memory/1200-67-0x0000000000000000-mapping.dmp
              • memory/1368-68-0x0000000000000000-mapping.dmp
              • memory/1368-70-0x0000000000200000-0x0000000000212000-memory.dmp
                Filesize

                72KB

              • memory/1480-63-0x0000000000000000-mapping.dmp
              • memory/1588-79-0x0000000000000000-mapping.dmp
              • memory/1588-81-0x0000000000360000-0x0000000000C64000-memory.dmp
                Filesize

                9.0MB

              • memory/1612-77-0x00000000004581EE-mapping.dmp
              • memory/1736-83-0x0000000000000000-mapping.dmp
              • memory/1764-62-0x0000000000400000-0x000000000045E000-memory.dmp
                Filesize

                376KB

              • memory/1764-59-0x00000000004581EE-mapping.dmp
              • memory/1896-54-0x0000000000A40000-0x0000000001344000-memory.dmp
                Filesize

                9.0MB

              • memory/1896-60-0x0000000000570000-0x0000000000573000-memory.dmp
                Filesize

                12KB

              • memory/1896-56-0x0000000075271000-0x0000000075273000-memory.dmp
                Filesize

                8KB

              • memory/1896-55-0x0000000005610000-0x0000000005674000-memory.dmp
                Filesize

                400KB

              • memory/1900-64-0x0000000000000000-mapping.dmp
              • memory/1988-58-0x0000000000000000-mapping.dmp
              • memory/1992-57-0x0000000000000000-mapping.dmp