Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
28-07-2022 05:14
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220715-en
General
-
Target
tmp.exe
-
Size
107KB
-
MD5
f8a7a4c5d75bfda7dbadf09e3a39e089
-
SHA1
4527a2ff764c084e55c190d98824ef664a6f1892
-
SHA256
6bb0ee5036962c86db2292f5ccd21d63a22cbb17a6937c0d89b53ea97b77e8e6
-
SHA512
54887714264f38063eb6166b3d77ba949ddf2b70d169f5d24fdddadb4cee8572d25031b0bcb0ecaa87deccce7b4449d41e7017debf2db7933598c9f18bd735e1
Malware Config
Extracted
redline
cheat
nicehash.at:1338
-
auth_value
8095fccd90c93353aaa1fc77bca0ff3f
Extracted
quasar
1.4.0
Office04
nicehash.at:4000
dc4bad02-e33b-461d-8bb2-c976586d2ac0
-
encryption_key
51DF8E701C6F05B28BEC40BEB21419EF5FEC8A38
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
300
-
startup_key
JavaClient Startup
-
subdirectory
JavaTools
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
74963e9852aafd36ba521fa22b39e244
-
install_dir
localappdata
-
install_file
Java.exe
-
tor_process
tor
Signatures
-
Quasar payload 7 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\qsr.exe family_quasar C:\Users\Admin\AppData\Local\Temp\qsr.exe family_quasar C:\Users\Admin\AppData\Local\Temp\qsr.exe family_quasar behavioral1/memory/2032-65-0x0000000000D10000-0x0000000000D94000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\JavaTools\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\JavaTools\Client.exe family_quasar behavioral1/memory/1964-73-0x0000000001310000-0x0000000001394000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1612-54-0x0000000000E80000-0x0000000000EA0000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
qsr.exebit.exeClient.exepid process 2032 qsr.exe 324 bit.exe 1964 Client.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\bit.exe upx \Users\Admin\AppData\Local\Temp\bit.exe upx \Users\Admin\AppData\Local\Temp\bit.exe upx behavioral1/memory/324-66-0x0000000000400000-0x00000000007E4000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\bit.exe upx behavioral1/memory/324-76-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
tmp.exepid process 1612 tmp.exe 1612 tmp.exe 1612 tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\localappdata\\Java.exe" bit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
bit.exepid process 324 bit.exe 324 bit.exe 324 bit.exe 324 bit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
tmp.exepid process 1612 tmp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
tmp.exeqsr.exebit.exeClient.exedescription pid process Token: SeDebugPrivilege 1612 tmp.exe Token: SeDebugPrivilege 2032 qsr.exe Token: SeDebugPrivilege 324 bit.exe Token: SeShutdownPrivilege 324 bit.exe Token: SeDebugPrivilege 1964 Client.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
bit.exeClient.exepid process 324 bit.exe 324 bit.exe 1964 Client.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
tmp.exeqsr.exeClient.exedescription pid process target process PID 1612 wrote to memory of 2032 1612 tmp.exe qsr.exe PID 1612 wrote to memory of 2032 1612 tmp.exe qsr.exe PID 1612 wrote to memory of 2032 1612 tmp.exe qsr.exe PID 1612 wrote to memory of 2032 1612 tmp.exe qsr.exe PID 1612 wrote to memory of 324 1612 tmp.exe bit.exe PID 1612 wrote to memory of 324 1612 tmp.exe bit.exe PID 1612 wrote to memory of 324 1612 tmp.exe bit.exe PID 1612 wrote to memory of 324 1612 tmp.exe bit.exe PID 2032 wrote to memory of 1976 2032 qsr.exe schtasks.exe PID 2032 wrote to memory of 1976 2032 qsr.exe schtasks.exe PID 2032 wrote to memory of 1976 2032 qsr.exe schtasks.exe PID 2032 wrote to memory of 1964 2032 qsr.exe Client.exe PID 2032 wrote to memory of 1964 2032 qsr.exe Client.exe PID 2032 wrote to memory of 1964 2032 qsr.exe Client.exe PID 1964 wrote to memory of 652 1964 Client.exe schtasks.exe PID 1964 wrote to memory of 652 1964 Client.exe schtasks.exe PID 1964 wrote to memory of 652 1964 Client.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\qsr.exe"C:\Users\Admin\AppData\Local\Temp\qsr.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "JavaClient Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\qsr.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1976
-
-
C:\Users\Admin\AppData\Roaming\JavaTools\Client.exe"C:\Users\Admin\AppData\Roaming\JavaTools\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "JavaClient Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\JavaTools\Client.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bit.exe"C:\Users\Admin\AppData\Local\Temp\bit.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:324
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c8fa9d8cf4ff8780466a34d8d5d43594
SHA11902971da5e39dccc308207ab77a7e1c987c31cd
SHA256772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214
SHA5129a87c3fc220fdc6f959fb9a5bfe6b526a003a4d1fd473581ba3d044bdf4cb3fffe531a5b56b87ea243a787da80a10372ff932457f069dd174be9654681f44c03
-
Filesize
1.4MB
MD5c8fa9d8cf4ff8780466a34d8d5d43594
SHA11902971da5e39dccc308207ab77a7e1c987c31cd
SHA256772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214
SHA5129a87c3fc220fdc6f959fb9a5bfe6b526a003a4d1fd473581ba3d044bdf4cb3fffe531a5b56b87ea243a787da80a10372ff932457f069dd174be9654681f44c03
-
Filesize
502KB
MD563ff62dafb5b4bed02a24c9738bbd899
SHA1b255bbb04d6166aa173ca5b447ef53ab46f53cb2
SHA256754a413b433a1f829bd215bfcd26d3a1e0cbdb09a7c3b8586e3d9d19bd4d7ed0
SHA51277e1cbb6d897497590f778e2efd66f895c01df35f1348d084aee513225760c702ff1d3ae45a631ec3868a19a8bb3aa5ef93c2e234002c7b7f9175891ce1992fc
-
Filesize
502KB
MD563ff62dafb5b4bed02a24c9738bbd899
SHA1b255bbb04d6166aa173ca5b447ef53ab46f53cb2
SHA256754a413b433a1f829bd215bfcd26d3a1e0cbdb09a7c3b8586e3d9d19bd4d7ed0
SHA51277e1cbb6d897497590f778e2efd66f895c01df35f1348d084aee513225760c702ff1d3ae45a631ec3868a19a8bb3aa5ef93c2e234002c7b7f9175891ce1992fc
-
Filesize
502KB
MD563ff62dafb5b4bed02a24c9738bbd899
SHA1b255bbb04d6166aa173ca5b447ef53ab46f53cb2
SHA256754a413b433a1f829bd215bfcd26d3a1e0cbdb09a7c3b8586e3d9d19bd4d7ed0
SHA51277e1cbb6d897497590f778e2efd66f895c01df35f1348d084aee513225760c702ff1d3ae45a631ec3868a19a8bb3aa5ef93c2e234002c7b7f9175891ce1992fc
-
Filesize
502KB
MD563ff62dafb5b4bed02a24c9738bbd899
SHA1b255bbb04d6166aa173ca5b447ef53ab46f53cb2
SHA256754a413b433a1f829bd215bfcd26d3a1e0cbdb09a7c3b8586e3d9d19bd4d7ed0
SHA51277e1cbb6d897497590f778e2efd66f895c01df35f1348d084aee513225760c702ff1d3ae45a631ec3868a19a8bb3aa5ef93c2e234002c7b7f9175891ce1992fc
-
Filesize
1.4MB
MD5c8fa9d8cf4ff8780466a34d8d5d43594
SHA11902971da5e39dccc308207ab77a7e1c987c31cd
SHA256772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214
SHA5129a87c3fc220fdc6f959fb9a5bfe6b526a003a4d1fd473581ba3d044bdf4cb3fffe531a5b56b87ea243a787da80a10372ff932457f069dd174be9654681f44c03
-
Filesize
1.4MB
MD5c8fa9d8cf4ff8780466a34d8d5d43594
SHA11902971da5e39dccc308207ab77a7e1c987c31cd
SHA256772f6645c35033bb27c15d96b3c9fc58bc7feca6b06e5a0479157b75987e2214
SHA5129a87c3fc220fdc6f959fb9a5bfe6b526a003a4d1fd473581ba3d044bdf4cb3fffe531a5b56b87ea243a787da80a10372ff932457f069dd174be9654681f44c03
-
Filesize
502KB
MD563ff62dafb5b4bed02a24c9738bbd899
SHA1b255bbb04d6166aa173ca5b447ef53ab46f53cb2
SHA256754a413b433a1f829bd215bfcd26d3a1e0cbdb09a7c3b8586e3d9d19bd4d7ed0
SHA51277e1cbb6d897497590f778e2efd66f895c01df35f1348d084aee513225760c702ff1d3ae45a631ec3868a19a8bb3aa5ef93c2e234002c7b7f9175891ce1992fc