Analysis
-
max time kernel
187s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 08:46
Static task
static1
Behavioral task
behavioral1
Sample
dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe
Resource
win10v2004-20220721-en
General
-
Target
dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe
-
Size
763KB
-
MD5
0cd6977068202fb2a7b3ab7c552ec508
-
SHA1
d012374c33fdb7337412c92f7fa4eb9ad2dd2068
-
SHA256
dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995
-
SHA512
3a85063893354d7946e3e1a7828592e5319668ce4b732b35376be5039a875d8c1216fd4c823b8d4122f693e5941694fcef382f6ddc1b15c2ba66c63d6c75c2b5
Malware Config
Extracted
quasar
1.4.0.0
Slave
167.99.251.51:3693
iyE19BRC25gRWkYEfy
-
encryption_key
bbCsAyVHv9b0Y3vfJLN0
-
install_name
Client.exe
-
log_directory
Explorer
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1672-75-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1672-76-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1672-77-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1672-78-0x000000000044943E-mapping.dmp family_quasar behavioral1/memory/1672-80-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1672-82-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar -
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Executes dropped EXE 2 IoCs
Processes:
Cortana.exeCortana.exepid process 1028 Cortana.exe 2020 Cortana.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Cortana.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Users\\Admin\\AppData\\Local\\Cortana.exe -boot" Cortana.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Cortana.exedescription pid process target process PID 1028 set thread context of 1672 1028 Cortana.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exeCortana.exeCortana.exepid process 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe 1028 Cortana.exe 2020 Cortana.exe 1028 Cortana.exe 1028 Cortana.exe 1028 Cortana.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exeCortana.exeCortana.exedescription pid process Token: SeDebugPrivilege 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe Token: SeDebugPrivilege 1028 Cortana.exe Token: SeDebugPrivilege 2020 Cortana.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exeexplorer.exeCortana.exedescription pid process target process PID 1492 wrote to memory of 1184 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe cmd.exe PID 1492 wrote to memory of 1184 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe cmd.exe PID 1492 wrote to memory of 1184 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe cmd.exe PID 1492 wrote to memory of 1184 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe cmd.exe PID 1492 wrote to memory of 1936 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe explorer.exe PID 1492 wrote to memory of 1936 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe explorer.exe PID 1492 wrote to memory of 1936 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe explorer.exe PID 1492 wrote to memory of 1936 1492 dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe explorer.exe PID 1740 wrote to memory of 1028 1740 explorer.exe Cortana.exe PID 1740 wrote to memory of 1028 1740 explorer.exe Cortana.exe PID 1740 wrote to memory of 1028 1740 explorer.exe Cortana.exe PID 1740 wrote to memory of 1028 1740 explorer.exe Cortana.exe PID 1028 wrote to memory of 2020 1028 Cortana.exe Cortana.exe PID 1028 wrote to memory of 2020 1028 Cortana.exe Cortana.exe PID 1028 wrote to memory of 2020 1028 Cortana.exe Cortana.exe PID 1028 wrote to memory of 2020 1028 Cortana.exe Cortana.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe PID 1028 wrote to memory of 1672 1028 Cortana.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe"C:\Users\Admin\AppData\Local\Temp\dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995.exe" "C:\Users\Admin\AppData\Local\Cortana.exe"2⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Local\Cortana.exe"2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Cortana.exe"C:\Users\Admin\AppData\Local\Cortana.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Cortana.exe"C:\Users\Admin\AppData\Local\Cortana.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Cortana.exeFilesize
763KB
MD50cd6977068202fb2a7b3ab7c552ec508
SHA1d012374c33fdb7337412c92f7fa4eb9ad2dd2068
SHA256dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995
SHA5123a85063893354d7946e3e1a7828592e5319668ce4b732b35376be5039a875d8c1216fd4c823b8d4122f693e5941694fcef382f6ddc1b15c2ba66c63d6c75c2b5
-
C:\Users\Admin\AppData\Local\Cortana.exeFilesize
763KB
MD50cd6977068202fb2a7b3ab7c552ec508
SHA1d012374c33fdb7337412c92f7fa4eb9ad2dd2068
SHA256dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995
SHA5123a85063893354d7946e3e1a7828592e5319668ce4b732b35376be5039a875d8c1216fd4c823b8d4122f693e5941694fcef382f6ddc1b15c2ba66c63d6c75c2b5
-
C:\Users\Admin\AppData\Local\Cortana.exeFilesize
763KB
MD50cd6977068202fb2a7b3ab7c552ec508
SHA1d012374c33fdb7337412c92f7fa4eb9ad2dd2068
SHA256dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995
SHA5123a85063893354d7946e3e1a7828592e5319668ce4b732b35376be5039a875d8c1216fd4c823b8d4122f693e5941694fcef382f6ddc1b15c2ba66c63d6c75c2b5
-
memory/1028-67-0x00000000002A0000-0x0000000000362000-memory.dmpFilesize
776KB
-
memory/1028-65-0x0000000000000000-mapping.dmp
-
memory/1184-59-0x0000000000000000-mapping.dmp
-
memory/1492-55-0x00000000005A0000-0x00000000005B8000-memory.dmpFilesize
96KB
-
memory/1492-58-0x000000000038B000-0x000000000038E000-memory.dmpFilesize
12KB
-
memory/1492-56-0x0000000076091000-0x0000000076093000-memory.dmpFilesize
8KB
-
memory/1492-54-0x0000000001320000-0x00000000013E2000-memory.dmpFilesize
776KB
-
memory/1492-57-0x000000000039F000-0x00000000003A2000-memory.dmpFilesize
12KB
-
memory/1672-72-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1672-73-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1672-75-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1672-76-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1672-77-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1672-78-0x000000000044943E-mapping.dmp
-
memory/1672-80-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1672-82-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/1740-63-0x000007FEFBF71000-0x000007FEFBF73000-memory.dmpFilesize
8KB
-
memory/1936-60-0x0000000000000000-mapping.dmp
-
memory/1936-62-0x0000000074E21000-0x0000000074E23000-memory.dmpFilesize
8KB
-
memory/2020-69-0x0000000000000000-mapping.dmp