Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2022 14:59
Static task
static1
Behavioral task
behavioral1
Sample
invoice554684093903ye74674.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
invoice554684093903ye74674.exe
Resource
win10v2004-20220812-en
General
-
Target
invoice554684093903ye74674.exe
-
Size
214KB
-
MD5
7658e4288d97431e0b22ee17ce907162
-
SHA1
2a7b17759b037e3cd4799f9bdb099256197b94d1
-
SHA256
4ed20217d84f7055b14abf31f97802c5f97b304b147f4d4132c0c1be177e3ff0
-
SHA512
51553c9b0d335c9a7a9591bc29c4171549405f011b8b9f8663b00e97d832685c1153bc69443eeb3c7ab598d0f8d3e4ac8f60dad10a8e5f7e4a15947502bafc00
-
SSDEEP
3072:P8oVzkyxfZoB5aDx+Y6HRUHmzhxlI35MNzFNub2h/DWih/H3GR:P8A4HvIdHehj7ubg/Phf3
Malware Config
Extracted
quasar
1.3.0.0
Godbless my Hustle
mill.hopto.org:7773
QSR_MUTEX_IYpAlOHqocnX5nf6J7
-
encryption_key
4AVo5Pq15qMZSQfQWCXf
-
install_name
Client.exe
-
log_directory
Ll
-
reconnect_delay
123
-
startup_key
str
-
subdirectory
SubDir
Extracted
nanocore
1.2.2.0
mill.hopto.org:4489
127.0.0.1:4489
f26f6140-1dcf-4d19-b29d-e8b4eda43999
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-07-03T15:17:26.062415736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4489
-
default_group
Heavenly
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
f26f6140-1dcf-4d19-b29d-e8b4eda43999
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
mill.hopto.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Server.exe family_quasar C:\Users\Admin\AppData\Local\Temp\Server.exe family_quasar behavioral2/memory/4444-137-0x0000000000E10000-0x0000000000E6E000-memory.dmp family_quasar -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
Server.exepid process 4444 Server.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
invoice554684093903ye74674.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation invoice554684093903ye74674.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
invoice554684093903ye74674.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" invoice554684093903ye74674.exe -
Processes:
invoice554684093903ye74674.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA invoice554684093903ye74674.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
invoice554684093903ye74674.exedescription pid process target process PID 2148 set thread context of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe -
Drops file in Program Files directory 2 IoCs
Processes:
invoice554684093903ye74674.exedescription ioc process File created C:\Program Files (x86)\DDP Host\ddphost.exe invoice554684093903ye74674.exe File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe invoice554684093903ye74674.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
invoice554684093903ye74674.exepid process 944 invoice554684093903ye74674.exe 944 invoice554684093903ye74674.exe 944 invoice554684093903ye74674.exe 944 invoice554684093903ye74674.exe 944 invoice554684093903ye74674.exe 944 invoice554684093903ye74674.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
invoice554684093903ye74674.exepid process 944 invoice554684093903ye74674.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
invoice554684093903ye74674.exeServer.exeinvoice554684093903ye74674.exedescription pid process Token: SeDebugPrivilege 2148 invoice554684093903ye74674.exe Token: SeDebugPrivilege 4444 Server.exe Token: SeDebugPrivilege 944 invoice554684093903ye74674.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Server.exepid process 4444 Server.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
invoice554684093903ye74674.exeServer.exedescription pid process target process PID 2148 wrote to memory of 4444 2148 invoice554684093903ye74674.exe Server.exe PID 2148 wrote to memory of 4444 2148 invoice554684093903ye74674.exe Server.exe PID 2148 wrote to memory of 4444 2148 invoice554684093903ye74674.exe Server.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 2148 wrote to memory of 944 2148 invoice554684093903ye74674.exe invoice554684093903ye74674.exe PID 4444 wrote to memory of 4780 4444 Server.exe schtasks.exe PID 4444 wrote to memory of 4780 4444 Server.exe schtasks.exe PID 4444 wrote to memory of 4780 4444 Server.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice554684093903ye74674.exe"C:\Users\Admin\AppData\Local\Temp\invoice554684093903ye74674.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "str" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Server.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\invoice554684093903ye74674.exe"C:\Users\Admin\AppData\Local\Temp\invoice554684093903ye74674.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
944B
MD5564716eed1d687a11ed72a316def6481
SHA1c2423fc47318cd25ecfab00cff85179cba4a9e01
SHA256636987560bea08b7ef5fd1886fd9b37e7d56aa7aa3ecb2b5d41129ae9150f615
SHA512052a4405491981896103c1fad4fb3ce36b1a1a0ed21802e1aba58164580b10baef1ea2d8cc1384578a9b67392cf9bb1f9c4d006eca3794178e01457ce42dd761
-
Filesize
348KB
MD542501e281de15d0331a70d0b34b94b8b
SHA1c9ae2a74d0e25e0d2c4946917767d46d33e208cc
SHA256b85d366a889518edf0a9899e2120de042965a72fc60c8795a2f9bd6eee96d58c
SHA512aaea1b070c6560264d2875b7fb355820af4ceab172ff4c5a6b21d893ec4955419c7b673bedae66beae5626dbbacf1c6fe7860008b49029275016c4ac97392f74
-
Filesize
348KB
MD542501e281de15d0331a70d0b34b94b8b
SHA1c9ae2a74d0e25e0d2c4946917767d46d33e208cc
SHA256b85d366a889518edf0a9899e2120de042965a72fc60c8795a2f9bd6eee96d58c
SHA512aaea1b070c6560264d2875b7fb355820af4ceab172ff4c5a6b21d893ec4955419c7b673bedae66beae5626dbbacf1c6fe7860008b49029275016c4ac97392f74