Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2022 06:53
Behavioral task
behavioral1
Sample
02962ce42a6b3910c33e9f9ace964bba.exe
Resource
win7-20220718-en
General
-
Target
02962ce42a6b3910c33e9f9ace964bba.exe
-
Size
666KB
-
MD5
02962ce42a6b3910c33e9f9ace964bba
-
SHA1
565d1a5cc063503879c5bd0dffa2cfe4e5a2e627
-
SHA256
2cb24e62607d1f4eef2ee22dca37a4eda7b97ea9b3d96443102548fe90c3edc3
-
SHA512
96fd7e1a6cd7e2f87274af902c7c327d7f09b1c15861983691a6ddf6a44961175876f97cbf0e31e383a36037ebaac9350c0e96ac49b4940a5ef3cd24ce1a5969
Malware Config
Extracted
quasar
2.1.0.0
DCNITRO01
0.tcp.eu.ngrok.io:10352
VNM_MUTEX_v9VGaskk4AIKeNY3U6
-
encryption_key
UZHpvfEZMUzQVIJjvgWB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
dc nitro(venom)
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/4560-130-0x0000000000EF0000-0x0000000000F9C000-memory.dmp disable_win_def -
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4560-130-0x0000000000EF0000-0x0000000000F9C000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
02962ce42a6b3910c33e9f9ace964bba.exedescription pid Process Token: SeDebugPrivilege 4560 02962ce42a6b3910c33e9f9ace964bba.exe Token: SeDebugPrivilege 4560 02962ce42a6b3910c33e9f9ace964bba.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
02962ce42a6b3910c33e9f9ace964bba.exepid Process 4560 02962ce42a6b3910c33e9f9ace964bba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
02962ce42a6b3910c33e9f9ace964bba.exedescription pid Process procid_target PID 4560 wrote to memory of 4540 4560 02962ce42a6b3910c33e9f9ace964bba.exe 79 PID 4560 wrote to memory of 4540 4560 02962ce42a6b3910c33e9f9ace964bba.exe 79 PID 4560 wrote to memory of 4540 4560 02962ce42a6b3910c33e9f9ace964bba.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\02962ce42a6b3910c33e9f9ace964bba.exe"C:\Users\Admin\AppData\Local\Temp\02962ce42a6b3910c33e9f9ace964bba.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "dc nitro(venom)" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\02962ce42a6b3910c33e9f9ace964bba.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4540
-