Analysis
-
max time kernel
131s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe
Resource
win7-20220414-en
General
-
Target
5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe
-
Size
9.0MB
-
MD5
987bb8bcc92a914d249989e8cca3b2e9
-
SHA1
d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26
-
SHA256
5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094
-
SHA512
23d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd
Malware Config
Extracted
quasar
1.3.0.0
Business
craft.ooguy.com:1981
GpDg1xgoq8qb9M6Jp6
-
encryption_key
bJJpHxbw80umglURXtYY
-
install_name
Client.exe
-
log_directory
4k
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-62-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE 2 IoCs
Processes:
FoxitPhantomFoxitPhantompid process 748 FoxitPhantom 1588 FoxitPhantom -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exeFoxitPhantomdescription pid process target process PID 1896 set thread context of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 748 set thread context of 1612 748 FoxitPhantom RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1900 1764 WerFault.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exeFoxitPhantompid process 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe 748 FoxitPhantom -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 1764 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 1764 RegAsm.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exeRegAsm.execmd.exetaskeng.exeFoxitPhantomFoxitPhantomdescription pid process target process PID 1896 wrote to memory of 1992 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1992 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1992 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1992 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1988 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1988 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1988 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1988 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe schtasks.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1896 wrote to memory of 1764 1896 5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe RegAsm.exe PID 1764 wrote to memory of 1480 1764 RegAsm.exe cmd.exe PID 1764 wrote to memory of 1480 1764 RegAsm.exe cmd.exe PID 1764 wrote to memory of 1480 1764 RegAsm.exe cmd.exe PID 1764 wrote to memory of 1480 1764 RegAsm.exe cmd.exe PID 1764 wrote to memory of 1900 1764 RegAsm.exe WerFault.exe PID 1764 wrote to memory of 1900 1764 RegAsm.exe WerFault.exe PID 1764 wrote to memory of 1900 1764 RegAsm.exe WerFault.exe PID 1764 wrote to memory of 1900 1764 RegAsm.exe WerFault.exe PID 1480 wrote to memory of 804 1480 cmd.exe chcp.com PID 1480 wrote to memory of 804 1480 cmd.exe chcp.com PID 1480 wrote to memory of 804 1480 cmd.exe chcp.com PID 1480 wrote to memory of 804 1480 cmd.exe chcp.com PID 1480 wrote to memory of 1200 1480 cmd.exe PING.EXE PID 1480 wrote to memory of 1200 1480 cmd.exe PING.EXE PID 1480 wrote to memory of 1200 1480 cmd.exe PING.EXE PID 1480 wrote to memory of 1200 1480 cmd.exe PING.EXE PID 1480 wrote to memory of 1368 1480 cmd.exe RegAsm.exe PID 1480 wrote to memory of 1368 1480 cmd.exe RegAsm.exe PID 1480 wrote to memory of 1368 1480 cmd.exe RegAsm.exe PID 1480 wrote to memory of 1368 1480 cmd.exe RegAsm.exe PID 1480 wrote to memory of 1368 1480 cmd.exe RegAsm.exe PID 1480 wrote to memory of 1368 1480 cmd.exe RegAsm.exe PID 1480 wrote to memory of 1368 1480 cmd.exe RegAsm.exe PID 1836 wrote to memory of 748 1836 taskeng.exe FoxitPhantom PID 1836 wrote to memory of 748 1836 taskeng.exe FoxitPhantom PID 1836 wrote to memory of 748 1836 taskeng.exe FoxitPhantom PID 1836 wrote to memory of 748 1836 taskeng.exe FoxitPhantom PID 748 wrote to memory of 1060 748 FoxitPhantom schtasks.exe PID 748 wrote to memory of 1060 748 FoxitPhantom schtasks.exe PID 748 wrote to memory of 1060 748 FoxitPhantom schtasks.exe PID 748 wrote to memory of 1060 748 FoxitPhantom schtasks.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 748 wrote to memory of 1612 748 FoxitPhantom RegAsm.exe PID 1836 wrote to memory of 1588 1836 taskeng.exe FoxitPhantom PID 1836 wrote to memory of 1588 1836 taskeng.exe FoxitPhantom PID 1836 wrote to memory of 1588 1836 taskeng.exe FoxitPhantom PID 1836 wrote to memory of 1588 1836 taskeng.exe FoxitPhantom PID 1588 wrote to memory of 1736 1588 FoxitPhantom schtasks.exe PID 1588 wrote to memory of 1736 1588 FoxitPhantom schtasks.exe PID 1588 wrote to memory of 1736 1588 FoxitPhantom schtasks.exe PID 1588 wrote to memory of 1736 1588 FoxitPhantom schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe"C:\Users\Admin\AppData\Local\Temp\5dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query2⤵
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /sc MINUTE /tn FoxitPhantomPDF /MO 1 /tr C:\Users\Admin\AppData\Roaming\FoxitPhantom2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dBR0ZGr9Swsb.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 15123⤵
- Program crash
-
C:\Windows\system32\taskeng.exetaskeng.exe {FB47E086-E0E0-4AF0-975C-69E7D3CE0B55} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\FoxitPhantomC:\Users\Admin\AppData\Roaming\FoxitPhantom2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\FoxitPhantomC:\Users\Admin\AppData\Roaming\FoxitPhantom2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /query3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dBR0ZGr9Swsb.batFilesize
215B
MD5c7a32209b4a3ec4863a1a781daa1a6f4
SHA12dbf9ddc87670fd6c4bfdb2d255ecf76a8723538
SHA25631c31c549f0d3cd35e43ef170fdea7dc430ce81bacd23b71c014f8ccc167184d
SHA512fe9edab4ac78b904017a11f81383544719dd39722daba38ad256a7a475a09f39be4c59f4ad474c4fd1f6b989d2a5534b112230a81ef08cd493d068df3d0cd91c
-
C:\Users\Admin\AppData\Roaming\FoxitPhantomFilesize
9.0MB
MD5987bb8bcc92a914d249989e8cca3b2e9
SHA1d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26
SHA2565dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094
SHA51223d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd
-
C:\Users\Admin\AppData\Roaming\FoxitPhantomFilesize
9.0MB
MD5987bb8bcc92a914d249989e8cca3b2e9
SHA1d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26
SHA2565dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094
SHA51223d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd
-
C:\Users\Admin\AppData\Roaming\FoxitPhantomFilesize
9.0MB
MD5987bb8bcc92a914d249989e8cca3b2e9
SHA1d09cfc64e1e7b22eb99fcc77c35d0286dfa74d26
SHA2565dd3a4cd00a5c5ce6335975b1541a39067f8c34f407202d7d631214bbfe47094
SHA51223d5356cfbbb8ad8e43e9d1a038f2c30a226fbb43b98bd1062317550bdee099aef51d1ede79781e449f8349b02bc1e67d604342995e89f03d8e3c4be061ea0bd
-
memory/748-74-0x0000000000C30000-0x0000000001534000-memory.dmpFilesize
9.0MB
-
memory/748-72-0x0000000000000000-mapping.dmp
-
memory/804-66-0x0000000000000000-mapping.dmp
-
memory/1060-76-0x0000000000000000-mapping.dmp
-
memory/1200-67-0x0000000000000000-mapping.dmp
-
memory/1368-68-0x0000000000000000-mapping.dmp
-
memory/1368-70-0x0000000000200000-0x0000000000212000-memory.dmpFilesize
72KB
-
memory/1480-63-0x0000000000000000-mapping.dmp
-
memory/1588-79-0x0000000000000000-mapping.dmp
-
memory/1588-81-0x0000000000360000-0x0000000000C64000-memory.dmpFilesize
9.0MB
-
memory/1612-77-0x00000000004581EE-mapping.dmp
-
memory/1736-83-0x0000000000000000-mapping.dmp
-
memory/1764-62-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1764-59-0x00000000004581EE-mapping.dmp
-
memory/1896-54-0x0000000000A40000-0x0000000001344000-memory.dmpFilesize
9.0MB
-
memory/1896-60-0x0000000000570000-0x0000000000573000-memory.dmpFilesize
12KB
-
memory/1896-56-0x0000000075271000-0x0000000075273000-memory.dmpFilesize
8KB
-
memory/1896-55-0x0000000005610000-0x0000000005674000-memory.dmpFilesize
400KB
-
memory/1900-64-0x0000000000000000-mapping.dmp
-
memory/1988-58-0x0000000000000000-mapping.dmp
-
memory/1992-57-0x0000000000000000-mapping.dmp