Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 14:27

General

  • Target

    teamredminer-v0.3.4-win/start_cnv8.bat

  • Size

    1KB

  • MD5

    2a3678b82753d786ac3a98c6ae19cc49

  • SHA1

    274dddcba965bf2949d64c687e719cb66030b484

  • SHA256

    ee912ceb57f257d5a6a3911b0954aa4de7d8eb46dd6e1bb8d6f245a2c400f404

  • SHA512

    1b31a7a5083606966f92814901f66e9266c16733669027171fbd21ed0ac4f981f0d0426ebe8d2544b2cd32fa03352d1f43fc17cf0372eb9f6cd2383bd916df1e

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

dendi

C2

185.244.217.92:4782

Mutex

QSR_MUTEX_LTcjNqRb6NS57npmpd

Attributes
  • encryption_key

    YaVqqMF3gVTZOI5Xevop

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar Payload 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Detected Stratum cryptominer command

    Looks to be attempting to contact Stratum mining pool.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\teamredminer-v0.3.4-win\start_cnv8.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\teamredminer-v0.3.4-win\teamredminer.exe
      teamredminer.exe -a cnv8 -o stratum+tcp://pool.supportxmr.com:7777 -u 479c6JsyawEVAMNZU8GMmXgVPTxd1vdejR6vVpsm7z8y2AvP7C5hz2g5gfrqyffpvLPLYb2eUmmWA5yhRw5ANYyePX7SvLE -p x
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exe
        "C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exe" /864A627C-C6B2-464A-AA13-25D62F282BD8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe
          "C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe" /864A627C-C6B2-464A-AA13-25D62F282BD8
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          PID:912
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {9ACA440A-1C52-4F76-9507-CAEF240CDA57} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of UnmapMainImage
      PID:1880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exe
    Filesize

    27KB

    MD5

    bb1b1f32ac085f55a363a55d8176595a

    SHA1

    87ef56d60592dfd59fa96d50080e7b3394b8deeb

    SHA256

    edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed

    SHA512

    4a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10

  • C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe
    Filesize

    27KB

    MD5

    bb1b1f32ac085f55a363a55d8176595a

    SHA1

    87ef56d60592dfd59fa96d50080e7b3394b8deeb

    SHA256

    edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed

    SHA512

    4a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10

  • C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe
    Filesize

    27KB

    MD5

    bb1b1f32ac085f55a363a55d8176595a

    SHA1

    87ef56d60592dfd59fa96d50080e7b3394b8deeb

    SHA256

    edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed

    SHA512

    4a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10

  • C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe.manifest
    Filesize

    885B

    MD5

    879025f0a2539beda0c48c868f570d59

    SHA1

    aa4369784a9d1d6579aad5bdfff408bac0026da4

    SHA256

    a52240fa90711da530b5b896a557eaf50ff02d7ea86bb95799816cc713c8c1e4

    SHA512

    3378b2b35e248d8daf3fd0b6b0d17f613f02b4b925fc2e3f3b1885c21f0fae2a8bd577127c83abbbd6029d3b8e25d8d407887b9744c790e458ed960fbb7d39b0

  • C:\Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\xsandbox.bin
    Filesize

    16B

    MD5

    ec3d19e8e9b05d025cb56c2a98ead8e7

    SHA1

    748532edeb86496c8efe5e2327501d89ec1f13df

    SHA256

    edb7be3ef6098a1e24d0c72bbc6f968dea773951a0dd07b63bad6d9009ae3bf4

    SHA512

    175fb8432472b6795bb5db0eba61bc7b57331720825df5b048f3086815ba844df4f7e83e42ff9e8fe5ab01700675a774cb916677953d6e0088ffbf1fa2775349

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
    Filesize

    4.2MB

    MD5

    d0d44a87f90f5794da09941f00aef6bb

    SHA1

    b683f5707b4c987c533e23c32961ae0b48d9c9b3

    SHA256

    4aff99a44b112f324fc5fa31d3d918811dda7e0548c50b42e9e4f7fa03000b2f

    SHA512

    01d85b73dea8b257fba3a711519df51846130528a1edebc5a10f36d9324b85de07a8e1f66367b979fc3cb0b167c959c5764033e85d1b77fe808f69a38805b6e7

  • C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe
    Filesize

    4.2MB

    MD5

    d0d44a87f90f5794da09941f00aef6bb

    SHA1

    b683f5707b4c987c533e23c32961ae0b48d9c9b3

    SHA256

    4aff99a44b112f324fc5fa31d3d918811dda7e0548c50b42e9e4f7fa03000b2f

    SHA512

    01d85b73dea8b257fba3a711519df51846130528a1edebc5a10f36d9324b85de07a8e1f66367b979fc3cb0b167c959c5764033e85d1b77fe808f69a38805b6e7

  • \Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\modified\@SYSWOW64@\rat.exe
    Filesize

    4.9MB

    MD5

    0d46a5e73dc74ebc14753f25796be25d

    SHA1

    ce737d3ce162912f5a0d8b13db022595b36b889c

    SHA256

    1e1635f254c180f6c7205444a14251a8dfb299f872b70bd41c69db711c349c15

    SHA512

    e00e107d9f194eadaa2d383b634a3a580ba43400909643bcfa5c41e069ff21f8a4f0101c3a311e11485dc4bd132463dfc555dc45fc0917ab8fb9be8e6ec47e33

  • \Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0x9C9723AAC2730F7F\cmd.exe
    Filesize

    27KB

    MD5

    bb1b1f32ac085f55a363a55d8176595a

    SHA1

    87ef56d60592dfd59fa96d50080e7b3394b8deeb

    SHA256

    edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed

    SHA512

    4a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10

  • \Users\Admin\AppData\Local\ERR\Sandbox\done\9.89.79.69\local\stubexe\0xDE1A80E194AEAC9E\schtasks.exe
    Filesize

    27KB

    MD5

    bb1b1f32ac085f55a363a55d8176595a

    SHA1

    87ef56d60592dfd59fa96d50080e7b3394b8deeb

    SHA256

    edebee8ac2202cc7f815bfb3aea2680542b21e32683461acb6187eba271f01ed

    SHA512

    4a9c685841f3dc9893b9fa5924ddca48dcdb6b05a6a64ab13e9e4fca3c55c66fff1df8464ce292aebb640052deec15679ffc39660b8a391404d392f67adf7d10

  • memory/912-232-0x0000000076CA0000-0x0000000076DB0000-memory.dmp
    Filesize

    1.1MB

  • memory/912-187-0x0000000000000000-mapping.dmp
  • memory/912-231-0x0000000001A00000-0x0000000001D4A000-memory.dmp
    Filesize

    3.3MB

  • memory/912-233-0x0000000076CA0000-0x0000000076DB0000-memory.dmp
    Filesize

    1.1MB

  • memory/956-84-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-121-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-80-0x0000000074B00000-0x0000000074B32000-memory.dmp
    Filesize

    200KB

  • memory/956-79-0x0000000074B00000-0x0000000074B32000-memory.dmp
    Filesize

    200KB

  • memory/956-78-0x0000000074B00000-0x0000000074B32000-memory.dmp
    Filesize

    200KB

  • memory/956-77-0x0000000074B00000-0x0000000074B32000-memory.dmp
    Filesize

    200KB

  • memory/956-76-0x0000000074B00000-0x0000000074B32000-memory.dmp
    Filesize

    200KB

  • memory/956-82-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-83-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-54-0x0000000000000000-mapping.dmp
  • memory/956-86-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-85-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-87-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-88-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-89-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-90-0x0000000074870000-0x0000000074A0E000-memory.dmp
    Filesize

    1.6MB

  • memory/956-92-0x0000000074850000-0x0000000074862000-memory.dmp
    Filesize

    72KB

  • memory/956-93-0x0000000074850000-0x0000000074862000-memory.dmp
    Filesize

    72KB

  • memory/956-94-0x0000000074850000-0x0000000074862000-memory.dmp
    Filesize

    72KB

  • memory/956-99-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-100-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-102-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-101-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-103-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-104-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-105-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-108-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-109-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-107-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-106-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-110-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-111-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-112-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-113-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-114-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-117-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-116-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-115-0x0000000074830000-0x0000000074847000-memory.dmp
    Filesize

    92KB

  • memory/956-120-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-70-0x0000000076CA0000-0x0000000076DB0000-memory.dmp
    Filesize

    1.1MB

  • memory/956-119-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-118-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-124-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-125-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-123-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-122-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-128-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-129-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-127-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-126-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-132-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-131-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-130-0x0000000074820000-0x000000007482B000-memory.dmp
    Filesize

    44KB

  • memory/956-163-0x0000000076CA0000-0x0000000076DB0000-memory.dmp
    Filesize

    1.1MB

  • memory/956-69-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-56-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB

  • memory/956-68-0x0000000000A50000-0x0000000000D95000-memory.dmp
    Filesize

    3.3MB

  • memory/956-67-0x00000000001B0000-0x00000000001B1000-memory.dmp
    Filesize

    4KB

  • memory/956-64-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-66-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-61-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-57-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-58-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-59-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-63-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-62-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/956-60-0x0000000000DA0000-0x00000000010EA000-memory.dmp
    Filesize

    3.3MB

  • memory/976-229-0x0000000076CA0000-0x0000000076DB0000-memory.dmp
    Filesize

    1.1MB

  • memory/976-230-0x0000000076CA0000-0x0000000076DB0000-memory.dmp
    Filesize

    1.1MB

  • memory/976-228-0x0000000001940000-0x0000000001C8A000-memory.dmp
    Filesize

    3.3MB

  • memory/976-165-0x0000000000000000-mapping.dmp
  • memory/1880-237-0x0000000000000000-mapping.dmp
  • memory/1880-271-0x0000000000E50000-0x000000000119A000-memory.dmp
    Filesize

    3.3MB

  • memory/1880-272-0x0000000076CA0000-0x0000000076DB0000-memory.dmp
    Filesize

    1.1MB

  • memory/1880-273-0x0000000000400000-0x0000000000836000-memory.dmp
    Filesize

    4.2MB

  • memory/1880-274-0x0000000000400000-0x0000000000836000-memory.dmp
    Filesize

    4.2MB

  • memory/1880-275-0x0000000000400000-0x0000000000836000-memory.dmp
    Filesize

    4.2MB

  • memory/1880-277-0x0000000000400000-0x000000000082C000-memory.dmp
    Filesize

    4.2MB