Analysis
-
max time kernel
150s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 14:27
Static task
static1
Behavioral task
behavioral1
Sample
teamredminer-v0.3.4-win/start_cnv8.bat
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
teamredminer-v0.3.4-win/start_cnv8.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
teamredminer-v0.3.4-win/start_phi2.bat
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
teamredminer-v0.3.4-win/start_phi2.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
teamredminer-v0.3.4-win/teamredminer.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
teamredminer-v0.3.4-win/teamredminer.exe
Resource
win10v2004-20220414-en
General
-
Target
teamredminer-v0.3.4-win/start_cnv8.bat
-
Size
1KB
-
MD5
2a3678b82753d786ac3a98c6ae19cc49
-
SHA1
274dddcba965bf2949d64c687e719cb66030b484
-
SHA256
ee912ceb57f257d5a6a3911b0954aa4de7d8eb46dd6e1bb8d6f245a2c400f404
-
SHA512
1b31a7a5083606966f92814901f66e9266c16733669027171fbd21ed0ac4f981f0d0426ebe8d2544b2cd32fa03352d1f43fc17cf0372eb9f6cd2383bd916df1e
Malware Config
Extracted
quasar
1.3.0.0
dendi
185.244.217.92:4782
QSR_MUTEX_LTcjNqRb6NS57npmpd
-
encryption_key
YaVqqMF3gVTZOI5Xevop
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1880-275-0x0000000000400000-0x0000000000836000-memory.dmp family_quasar behavioral1/memory/1880-277-0x0000000000400000-0x000000000082C000-memory.dmp family_quasar -
Detected Stratum cryptominer command
Looks to be attempting to contact Stratum mining pool.
-
Executes dropped EXE 3 IoCs
Processes:
cmd.exeschtasks.exesvchost.exepid process 976 cmd.exe 912 schtasks.exe 1880 svchost.exe -
Loads dropped DLL 3 IoCs
Processes:
teamredminer.execmd.exepid process 956 teamredminer.exe 956 teamredminer.exe 976 cmd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\modified\@SYSWOW64@\rat.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
svchost.exepid process 1880 svchost.exe 1880 svchost.exe 1880 svchost.exe 1880 svchost.exe 1880 svchost.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
teamredminer.exepid process 956 teamredminer.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
teamredminer.execmd.exeschtasks.exesvchost.exedescription pid process Token: 33 956 teamredminer.exe Token: SeIncBasePriorityPrivilege 956 teamredminer.exe Token: 33 976 cmd.exe Token: SeIncBasePriorityPrivilege 976 cmd.exe Token: 33 912 schtasks.exe Token: SeIncBasePriorityPrivilege 912 schtasks.exe Token: 33 1880 svchost.exe Token: SeIncBasePriorityPrivilege 1880 svchost.exe Token: 33 1880 svchost.exe Token: SeIncBasePriorityPrivilege 1880 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 1880 svchost.exe -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
teamredminer.execmd.exeschtasks.exesvchost.exepid process 956 teamredminer.exe 976 cmd.exe 912 schtasks.exe 1880 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
cmd.exeteamredminer.execmd.exetaskeng.exedescription pid process target process PID 684 wrote to memory of 956 684 cmd.exe teamredminer.exe PID 684 wrote to memory of 956 684 cmd.exe teamredminer.exe PID 684 wrote to memory of 956 684 cmd.exe teamredminer.exe PID 684 wrote to memory of 956 684 cmd.exe teamredminer.exe PID 956 wrote to memory of 976 956 teamredminer.exe cmd.exe PID 956 wrote to memory of 976 956 teamredminer.exe cmd.exe PID 956 wrote to memory of 976 956 teamredminer.exe cmd.exe PID 956 wrote to memory of 976 956 teamredminer.exe cmd.exe PID 956 wrote to memory of 976 956 teamredminer.exe cmd.exe PID 956 wrote to memory of 976 956 teamredminer.exe cmd.exe PID 956 wrote to memory of 976 956 teamredminer.exe cmd.exe PID 976 wrote to memory of 912 976 cmd.exe schtasks.exe PID 976 wrote to memory of 912 976 cmd.exe schtasks.exe PID 976 wrote to memory of 912 976 cmd.exe schtasks.exe PID 976 wrote to memory of 912 976 cmd.exe schtasks.exe PID 976 wrote to memory of 912 976 cmd.exe schtasks.exe PID 976 wrote to memory of 912 976 cmd.exe schtasks.exe PID 976 wrote to memory of 912 976 cmd.exe schtasks.exe PID 1680 wrote to memory of 1880 1680 taskeng.exe svchost.exe PID 1680 wrote to memory of 1880 1680 taskeng.exe svchost.exe PID 1680 wrote to memory of 1880 1680 taskeng.exe svchost.exe PID 1680 wrote to memory of 1880 1680 taskeng.exe svchost.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\teamredminer-v0.3.4-win\start_cnv8.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\teamredminer-v0.3.4-win\teamredminer.exeteamredminer.exe -a cnv8 -o stratum+tcp://pool.supportxmr.com:7777 -u 479c6JsyawEVAMNZU8GMmXgVPTxd1vdejR6vVpsm7z8y2AvP7C5hz2g5gfrqyffpvLPLYb2eUmmWA5yhRw5ANYyePX7SvLE -p x2⤵
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exe"C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exe" /864A627C-C6B2-464A-AA13-25D62F282BD83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe"C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe" /864A627C-C6B2-464A-AA13-25D62F282BD84⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\taskeng.exetaskeng.exe {9ACA440A-1C52-4F76-9507-CAEF240CDA57} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exeFilesize
27KB
MD5bb1b1f32ac085f55a363a55d8176595a
SHA187ef56d60592dfd59fa96d50080e7b3394b8deeb
SHA256edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed
SHA5124a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10
-
C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exeFilesize
27KB
MD5bb1b1f32ac085f55a363a55d8176595a
SHA187ef56d60592dfd59fa96d50080e7b3394b8deeb
SHA256edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed
SHA5124a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10
-
C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exeFilesize
27KB
MD5bb1b1f32ac085f55a363a55d8176595a
SHA187ef56d60592dfd59fa96d50080e7b3394b8deeb
SHA256edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed
SHA5124a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10
-
C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe.manifestFilesize
885B
MD5879025f0a2539beda0c48c868f570d59
SHA1aa4369784a9d1d6579aad5bdfff408bac0026da4
SHA256a52240fa90711da530b5b896a557eaf50ff02d7ea86bb95799816cc713c8c1e4
SHA5123378b2b35e248d8daf3fd0b6b0d17f613f02b4b925fc2e3f3b1885c21f0fae2a8bd577127c83abbbd6029d3b8e25d8d407887b9744c790e458ed960fbb7d39b0
-
C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\xsandbox.binFilesize
16B
MD5ec3d19e8e9b05d025cb56c2a98ead8e7
SHA1748532edeb86496c8efe5e2327501d89ec1f13df
SHA256edb7be3ef6098a1e24d0c72bbc6f968dea773951a0dd07b63bad6d9009ae3bf4
SHA512175fb8432472b6795bb5db0eba61bc7b57331720825df5b048f3086815ba844df4f7e83e42ff9e8fe5ab01700675a774cb916677953d6e0088ffbf1fa2775349
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFilesize
4.2MB
MD5d0d44a87f90f5794da09941f00aef6bb
SHA1b683f5707b4c987c533e23c32961ae0b48d9c9b3
SHA2564aff99a44b112f324fc5fa31d3d918811dda7e0548c50b42e9e4f7fa03000b2f
SHA51201d85b73dea8b257fba3a711519df51846130528a1edebc5a10f36d9324b85de07a8e1f66367b979fc3cb0b167c959c5764033e85d1b77fe808f69a38805b6e7
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFilesize
4.2MB
MD5d0d44a87f90f5794da09941f00aef6bb
SHA1b683f5707b4c987c533e23c32961ae0b48d9c9b3
SHA2564aff99a44b112f324fc5fa31d3d918811dda7e0548c50b42e9e4f7fa03000b2f
SHA51201d85b73dea8b257fba3a711519df51846130528a1edebc5a10f36d9324b85de07a8e1f66367b979fc3cb0b167c959c5764033e85d1b77fe808f69a38805b6e7
-
\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\modified\@SYSWOW64@\rat.exeFilesize
4.9MB
MD50d46a5e73dc74ebc14753f25796be25d
SHA1ce737d3ce162912f5a0d8b13db022595b36b889c
SHA2561e1635f254c180f6c7205444a14251a8dfb299f872b70bd41c69db711c349c15
SHA512e00e107d9f194eadaa2d383b634a3a580ba43400909643bcfa5c41e069ff21f8a4f0101c3a311e11485dc4bd132463dfc555dc45fc0917ab8fb9be8e6ec47e33
-
\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exeFilesize
27KB
MD5bb1b1f32ac085f55a363a55d8176595a
SHA187ef56d60592dfd59fa96d50080e7b3394b8deeb
SHA256edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed
SHA5124a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10
-
\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exeFilesize
27KB
MD5bb1b1f32ac085f55a363a55d8176595a
SHA187ef56d60592dfd59fa96d50080e7b3394b8deeb
SHA256edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed
SHA5124a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10
-
memory/912-232-0x0000000076CA0000-0x0000000076DB0000-memory.dmpFilesize
1.1MB
-
memory/912-187-0x0000000000000000-mapping.dmp
-
memory/912-231-0x0000000001A00000-0x0000000001D4A000-memory.dmpFilesize
3.3MB
-
memory/912-233-0x0000000076CA0000-0x0000000076DB0000-memory.dmpFilesize
1.1MB
-
memory/956-84-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-121-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-80-0x0000000074B00000-0x0000000074B32000-memory.dmpFilesize
200KB
-
memory/956-79-0x0000000074B00000-0x0000000074B32000-memory.dmpFilesize
200KB
-
memory/956-78-0x0000000074B00000-0x0000000074B32000-memory.dmpFilesize
200KB
-
memory/956-77-0x0000000074B00000-0x0000000074B32000-memory.dmpFilesize
200KB
-
memory/956-76-0x0000000074B00000-0x0000000074B32000-memory.dmpFilesize
200KB
-
memory/956-82-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-83-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-54-0x0000000000000000-mapping.dmp
-
memory/956-86-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-85-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-87-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-88-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-89-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-90-0x0000000074870000-0x0000000074A0E000-memory.dmpFilesize
1.6MB
-
memory/956-92-0x0000000074850000-0x0000000074862000-memory.dmpFilesize
72KB
-
memory/956-93-0x0000000074850000-0x0000000074862000-memory.dmpFilesize
72KB
-
memory/956-94-0x0000000074850000-0x0000000074862000-memory.dmpFilesize
72KB
-
memory/956-99-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-100-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-102-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-101-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-103-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-104-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-105-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-108-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-109-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-107-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-106-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-110-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-111-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-112-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-113-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-114-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-117-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-116-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-115-0x0000000074830000-0x0000000074847000-memory.dmpFilesize
92KB
-
memory/956-120-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-70-0x0000000076CA0000-0x0000000076DB0000-memory.dmpFilesize
1.1MB
-
memory/956-119-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-118-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-124-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-125-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-123-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-122-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-128-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-129-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-127-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-126-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-132-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-131-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-130-0x0000000074820000-0x000000007482B000-memory.dmpFilesize
44KB
-
memory/956-163-0x0000000076CA0000-0x0000000076DB0000-memory.dmpFilesize
1.1MB
-
memory/956-69-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-56-0x00000000753B1000-0x00000000753B3000-memory.dmpFilesize
8KB
-
memory/956-68-0x0000000000A50000-0x0000000000D95000-memory.dmpFilesize
3.3MB
-
memory/956-67-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/956-64-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-66-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-61-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-57-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-58-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-59-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-63-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-62-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/956-60-0x0000000000DA0000-0x00000000010EA000-memory.dmpFilesize
3.3MB
-
memory/976-229-0x0000000076CA0000-0x0000000076DB0000-memory.dmpFilesize
1.1MB
-
memory/976-230-0x0000000076CA0000-0x0000000076DB0000-memory.dmpFilesize
1.1MB
-
memory/976-228-0x0000000001940000-0x0000000001C8A000-memory.dmpFilesize
3.3MB
-
memory/976-165-0x0000000000000000-mapping.dmp
-
memory/1880-237-0x0000000000000000-mapping.dmp
-
memory/1880-271-0x0000000000E50000-0x000000000119A000-memory.dmpFilesize
3.3MB
-
memory/1880-272-0x0000000076CA0000-0x0000000076DB0000-memory.dmpFilesize
1.1MB
-
memory/1880-273-0x0000000000400000-0x0000000000836000-memory.dmpFilesize
4.2MB
-
memory/1880-274-0x0000000000400000-0x0000000000836000-memory.dmpFilesize
4.2MB
-
memory/1880-275-0x0000000000400000-0x0000000000836000-memory.dmpFilesize
4.2MB
-
memory/1880-277-0x0000000000400000-0x000000000082C000-memory.dmpFilesize
4.2MB