Analysis
-
max time kernel
57s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-06-2022 09:24
Static task
static1
Behavioral task
behavioral1
Sample
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe
Resource
win7-20220414-en
General
-
Target
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe
-
Size
299KB
-
MD5
bb73586cedd8767a216880ba2a7c7750
-
SHA1
84a6c6c4908088349d5042f1a57374df7a8469f1
-
SHA256
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada
-
SHA512
721bf82d3dfc0b2943283c7c8c4bac7afe54e4e2d1772cf27a254e5bbb6bb89d9dd5c2464a026de8d838d455187cfac0a0864d7ec8d77273d96a4ba92afb07cd
Malware Config
Extracted
quasar
1.4.0.0
CEO
worldwide567678.zapto.org:1714
Hroy95BxsKwWGMw1fF
-
encryption_key
xFdMg8u08utwhtKUrD9B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/916-67-0x0000000004C70000-0x0000000004CBE000-memory.dmp family_quasar behavioral1/memory/2036-71-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/2036-72-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/2036-73-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/2036-74-0x000000000044943E-mapping.dmp family_quasar behavioral1/memory/2036-76-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/2036-78-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar -
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Drops startup file 1 IoCs
Processes:
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dIQVAO.url 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exedescription pid process target process PID 916 set thread context of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1228 2036 WerFault.exe RegAsm.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exepid process 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe Token: SeDebugPrivilege 2036 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 2036 RegAsm.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.execsc.exeRegAsm.execmd.exedescription pid process target process PID 916 wrote to memory of 1528 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe csc.exe PID 916 wrote to memory of 1528 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe csc.exe PID 916 wrote to memory of 1528 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe csc.exe PID 916 wrote to memory of 1528 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe csc.exe PID 1528 wrote to memory of 632 1528 csc.exe cvtres.exe PID 1528 wrote to memory of 632 1528 csc.exe cvtres.exe PID 1528 wrote to memory of 632 1528 csc.exe cvtres.exe PID 1528 wrote to memory of 632 1528 csc.exe cvtres.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 916 wrote to memory of 2036 916 262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe RegAsm.exe PID 2036 wrote to memory of 1964 2036 RegAsm.exe cmd.exe PID 2036 wrote to memory of 1964 2036 RegAsm.exe cmd.exe PID 2036 wrote to memory of 1964 2036 RegAsm.exe cmd.exe PID 2036 wrote to memory of 1964 2036 RegAsm.exe cmd.exe PID 2036 wrote to memory of 1228 2036 RegAsm.exe WerFault.exe PID 2036 wrote to memory of 1228 2036 RegAsm.exe WerFault.exe PID 2036 wrote to memory of 1228 2036 RegAsm.exe WerFault.exe PID 2036 wrote to memory of 1228 2036 RegAsm.exe WerFault.exe PID 1964 wrote to memory of 776 1964 cmd.exe chcp.com PID 1964 wrote to memory of 776 1964 cmd.exe chcp.com PID 1964 wrote to memory of 776 1964 cmd.exe chcp.com PID 1964 wrote to memory of 776 1964 cmd.exe chcp.com PID 1964 wrote to memory of 1632 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 1632 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 1632 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 1632 1964 cmd.exe PING.EXE PID 1964 wrote to memory of 1256 1964 cmd.exe RegAsm.exe PID 1964 wrote to memory of 1256 1964 cmd.exe RegAsm.exe PID 1964 wrote to memory of 1256 1964 cmd.exe RegAsm.exe PID 1964 wrote to memory of 1256 1964 cmd.exe RegAsm.exe PID 1964 wrote to memory of 1256 1964 cmd.exe RegAsm.exe PID 1964 wrote to memory of 1256 1964 cmd.exe RegAsm.exe PID 1964 wrote to memory of 1256 1964 cmd.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe"C:\Users\Admin\AppData\Local\Temp\262c4b94a1c528e8363f05beb57b03783ae33d61b3fa2ad4e7815d70d9781ada.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vwwaxcdu\vwwaxcdu.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES17D5.tmp" "c:\Users\Admin\AppData\Local\Temp\vwwaxcdu\CSC524A1BF9F03749B2B271A7A6E0A392C.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IBsN3wx2VT8p.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 15123⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IBsN3wx2VT8p.batFilesize
215B
MD542792f07603dd29fd01256bf774f4d02
SHA102486e25d04a65bc5c709bc30eeaf1e1b95e201a
SHA25636d2d816036f881be9926ac03ddec5f23cebe0088e31a73f4ca3f95f90e95af8
SHA5125037335a95a62de018ac109e2aab73ffe3722d54045da59dd431fbf1208d0590da0e031cd06b45d3ec0e3dd24e50d371c8bd1e2c1e668233db1ce97941b3a66b
-
C:\Users\Admin\AppData\Local\Temp\RES17D5.tmpFilesize
1KB
MD553050cdf3f75a90bc007e5b99c172abc
SHA1e75d3d0d99291063dcf8fa2c4d6d4bd50226762c
SHA2566a42f81badd3c4c955b1777bb524813167271838c003d368d6cd1fd61408c3da
SHA512e5d0ce07915c48bbdb7ed9dcd3ccb41f091cbb6cb33a874f4869c75a3132f346ab41e45fa9d7025efd659a3a1e73f867a4a103ac650a31112c59734db39b963e
-
C:\Users\Admin\AppData\Local\Temp\vwwaxcdu\vwwaxcdu.dllFilesize
6KB
MD5d878a0405ec8e1c506b20f062bd15c95
SHA1aaba18dcbb1aa1628c0c0443a9e846c0fdb0eb3b
SHA256474d262a85e2772b12b7d033d2ebef62c070eb3097570461ba329e6398077e50
SHA512af3b3c89f527ff9d1c07aa08f4d3f5a90ab04049240d8f8469e1b8ca08e9eaed4dadf0f6c2a45fb385a668e1cd23f65fe3c47f239e639cbd03db2cc9af005ad1
-
C:\Users\Admin\AppData\Local\Temp\vwwaxcdu\vwwaxcdu.pdbFilesize
15KB
MD50a2365165b9b1c9a304e5ce57b203760
SHA1c688d68efcc0463df646f9ca73ab442a424e3f99
SHA256d756a9837ffb932152c92da13c8e911a455633d2545cfe9eb6cff4efd2ae63f8
SHA512bacea0a12eb3b201ade46e324ba55a1d10bb5c6b2bdfe7b6c3964b6b0e4dfd66bd8df8fa2d583cda54d57e9603a3a9e648d1c3f5934183764a633120383f7b48
-
\??\c:\Users\Admin\AppData\Local\Temp\vwwaxcdu\CSC524A1BF9F03749B2B271A7A6E0A392C.TMPFilesize
1KB
MD5848ad8dbba6e549d3de58e57e58ff75b
SHA143cde3f4cda817124cfd90f8a1aa2f5dca77f44d
SHA256e269fa9a223c9ef15485d7d896a8c00fe27f1c695c55fe48d1be4cef99eab3b0
SHA5128ce737ca5ae25dc68d2541cae8996cc6a628a24f4ada9736ba979afebb2865a0f0a70ba13d71edde08f26715f40117c9f0efb0a765e874b7e7d74d4a5bc54c7f
-
\??\c:\Users\Admin\AppData\Local\Temp\vwwaxcdu\vwwaxcdu.0.csFilesize
2KB
MD53bb7bebdb89f1c2f229090bb605bc82e
SHA1325c1d845f3f4d9d017905ca53aad651321579f4
SHA256a70f9fa875053a6b74d21076d401a7c37dc2942a76882efebe4d08468634dc75
SHA512e733d4d7b3c4684e96a9c1c40c78fea193f9d780fed4320409b6d3dc1ff828436a7b323921bb5209c0814e3bb43580024f15ab51aa8e58cc4bf01c8ddd9297bf
-
\??\c:\Users\Admin\AppData\Local\Temp\vwwaxcdu\vwwaxcdu.cmdlineFilesize
312B
MD5a3fc2f3b92558cf61459843b39387e2f
SHA18976e54391bc02794aa8f0f2aa0330513394fe49
SHA2567755ee54542f4497ce3caa5cb2f77f14f645b9e4f92c0c74222792b2bbd5dd76
SHA512534c84f0b7a9de6707c07a5b78efe4d6bc2d466e322ef89d3045a0c123b8e97bf16e157964be4776775a466e8d1c8a09c3a4d0132a8507094064ff01f9484b24
-
memory/632-58-0x0000000000000000-mapping.dmp
-
memory/776-83-0x0000000000000000-mapping.dmp
-
memory/916-64-0x0000000004450000-0x00000000044A8000-memory.dmpFilesize
352KB
-
memory/916-65-0x0000000000470000-0x000000000047C000-memory.dmpFilesize
48KB
-
memory/916-66-0x0000000075711000-0x0000000075713000-memory.dmpFilesize
8KB
-
memory/916-67-0x0000000004C70000-0x0000000004CBE000-memory.dmpFilesize
312KB
-
memory/916-54-0x0000000000090000-0x00000000000E0000-memory.dmpFilesize
320KB
-
memory/916-63-0x0000000000230000-0x0000000000238000-memory.dmpFilesize
32KB
-
memory/1228-81-0x0000000000000000-mapping.dmp
-
memory/1256-87-0x00000000003C0000-0x00000000003D2000-memory.dmpFilesize
72KB
-
memory/1256-85-0x0000000000000000-mapping.dmp
-
memory/1528-55-0x0000000000000000-mapping.dmp
-
memory/1632-84-0x0000000000000000-mapping.dmp
-
memory/1964-80-0x0000000000000000-mapping.dmp
-
memory/2036-68-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2036-78-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2036-76-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2036-74-0x000000000044943E-mapping.dmp
-
memory/2036-73-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2036-72-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2036-71-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2036-69-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB