Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 10:11
Static task
static1
Behavioral task
behavioral1
Sample
3HkvftGZK9KZ.exe
Resource
win7-20220812-en
General
-
Target
3HkvftGZK9KZ.exe
-
Size
1.3MB
-
MD5
6ef27bb17948bf2cd5f17d32506ab25f
-
SHA1
1cace02f54cb1696be68e2ee291e26c051293a51
-
SHA256
4a412162a0b00623211b7303bc18b00b76d196ea8343a2c35abc262e9e97c9b2
-
SHA512
38d33e4f1d445ddbb5a45be34f369e60b22f5c29733e3acec9b156851e8494cd5845d22b2c71794b51c2ae73a890685f35dc1738c0e706f8b93c2272545885de
-
SSDEEP
24576:0KWHORcD/gtB49yDx553XTWcdjrFY5des+Lpq1qe9UdaRkss0:MHMRBO4TxXTLtLpqjOd+kss
Malware Config
Extracted
quasar
1.4.0
Office04
173.225.115.99:7702
ecce8627-6b34-425d-8f0e-3a8923c66220
-
encryption_key
F04A75E6507173FAEEC2BB82C564030A5E8413FF
-
install_name
ser.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
quar
Extracted
limerat
-
aes_key
082808
-
antivm
true
-
c2_url
https://pastebin.com/raw/Mh8T0LJe
-
delay
6
-
download_payload
false
-
install
true
-
install_name
limo.exe
-
main_folder
Temp
-
payload_url
https://mdl.arabou.edu.kw/ksa/user/profile/field/text/lang/en/VB64.exe
-
pin_spread
true
-
sub_folder
\Windows\
-
usb_spread
true
Signatures
-
Quasar payload 5 IoCs
resource yara_rule behavioral2/files/0x001b00000001d9f9-147.dat family_quasar behavioral2/memory/4848-149-0x00000000006F0000-0x0000000000774000-memory.dmp family_quasar behavioral2/files/0x001b00000001d9f9-148.dat family_quasar behavioral2/files/0x0006000000022e12-158.dat family_quasar behavioral2/files/0x0006000000022e12-159.dat family_quasar -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 1624 fend.exe 2748 gate.exe 2340 VB64.exe 4848 qua.exe 1284 ser.exe 1616 b52gate.exe 2224 B72PweJ9Vbnr.exe 1684 limo.exe 2888 tmp1596.tmpVB64.exe 1124 sysinf.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation b52gate.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 3HkvftGZK9KZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation gate.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ser.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation B72PweJ9Vbnr.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation limo.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sYYoHUclxy8Dmidc8a7YdLZgtpM.exe b52gate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sYYoHUclxy8Dmidc8a7YdLZgtpM.exe b52gate.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b52gate = "C:\\Users\\Admin\\AppData\\Roaming\\b52gate\\b52gate.exe" b52gate.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 api.ipify.org 38 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 b52gate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b52gate.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 b52gate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b52gate.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1684 limo.exe 1684 limo.exe 1684 limo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1616 b52gate.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4848 qua.exe Token: SeDebugPrivilege 2748 gate.exe Token: SeDebugPrivilege 1284 ser.exe Token: SeDebugPrivilege 1684 limo.exe Token: SeDebugPrivilege 1684 limo.exe Token: SeDebugPrivilege 2888 tmp1596.tmpVB64.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2748 gate.exe 1284 ser.exe 1616 b52gate.exe 1284 ser.exe 1284 ser.exe 1284 ser.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1284 ser.exe 1284 ser.exe 1284 ser.exe 1284 ser.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3792 wrote to memory of 1624 3792 3HkvftGZK9KZ.exe 82 PID 3792 wrote to memory of 1624 3792 3HkvftGZK9KZ.exe 82 PID 3792 wrote to memory of 2748 3792 3HkvftGZK9KZ.exe 83 PID 3792 wrote to memory of 2748 3792 3HkvftGZK9KZ.exe 83 PID 3792 wrote to memory of 2748 3792 3HkvftGZK9KZ.exe 83 PID 3792 wrote to memory of 2340 3792 3HkvftGZK9KZ.exe 84 PID 3792 wrote to memory of 2340 3792 3HkvftGZK9KZ.exe 84 PID 3792 wrote to memory of 4848 3792 3HkvftGZK9KZ.exe 85 PID 3792 wrote to memory of 4848 3792 3HkvftGZK9KZ.exe 85 PID 4848 wrote to memory of 1284 4848 qua.exe 88 PID 4848 wrote to memory of 1284 4848 qua.exe 88 PID 2748 wrote to memory of 1616 2748 gate.exe 89 PID 2748 wrote to memory of 1616 2748 gate.exe 89 PID 2748 wrote to memory of 1616 2748 gate.exe 89 PID 1284 wrote to memory of 2224 1284 ser.exe 97 PID 1284 wrote to memory of 2224 1284 ser.exe 97 PID 1284 wrote to memory of 2224 1284 ser.exe 97 PID 2224 wrote to memory of 2732 2224 B72PweJ9Vbnr.exe 98 PID 2224 wrote to memory of 2732 2224 B72PweJ9Vbnr.exe 98 PID 2224 wrote to memory of 2732 2224 B72PweJ9Vbnr.exe 98 PID 2224 wrote to memory of 1684 2224 B72PweJ9Vbnr.exe 100 PID 2224 wrote to memory of 1684 2224 B72PweJ9Vbnr.exe 100 PID 2224 wrote to memory of 1684 2224 B72PweJ9Vbnr.exe 100 PID 1684 wrote to memory of 2888 1684 limo.exe 101 PID 1684 wrote to memory of 2888 1684 limo.exe 101 PID 1616 wrote to memory of 1124 1616 b52gate.exe 102 PID 1616 wrote to memory of 1124 1616 b52gate.exe 102 PID 1616 wrote to memory of 1124 1616 b52gate.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3HkvftGZK9KZ.exe"C:\Users\Admin\AppData\Local\Temp\3HkvftGZK9KZ.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\fend.exe"C:\Users\Admin\AppData\Local\Temp\fend.exe"2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\gate.exe"C:\Users\Admin\AppData\Local\Temp\gate.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe"C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\sysinf.exe"C:\Users\Admin\AppData\Local\Temp\sysinf.exe"4⤵
- Executes dropped EXE
PID:1124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\VB64.exe"C:\Users\Admin\AppData\Local\Temp\VB64.exe"2⤵
- Executes dropped EXE
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\qua.exe"C:\Users\Admin\AppData\Local\Temp\qua.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Roaming\quar\ser.exe"C:\Users\Admin\AppData\Roaming\quar\ser.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\B72PweJ9Vbnr.exe"C:\Users\Admin\AppData\Local\Temp\B72PweJ9Vbnr.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Local\Temp\Windows\limo.exe'"5⤵
- Creates scheduled task(s)
PID:2732
-
-
C:\Users\Admin\AppData\Local\Temp\Windows\limo.exe"C:\Users\Admin\AppData\Local\Temp\Windows\limo.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\tmp1596.tmpVB64.exe"C:\Users\Admin\AppData\Local\Temp\tmp1596.tmpVB64.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD53ed009fe337a7081b5d8b6ab558779ea
SHA10fab458919e434f2ee62d4513521bb795fa4a6a3
SHA256241612ebc1cb84fa0f2bd663718f35ca9e07f2ff2640ffe113afe3cecb9bd2bd
SHA512511cb5dabca9ace7c369e77510428a7144824a53894af42cba04ada12884228a14747f1b4e87ed6aa10d0101ee90567c3c873fd33c8450f8ccc3892b4cf669ea
-
Filesize
28KB
MD53ed009fe337a7081b5d8b6ab558779ea
SHA10fab458919e434f2ee62d4513521bb795fa4a6a3
SHA256241612ebc1cb84fa0f2bd663718f35ca9e07f2ff2640ffe113afe3cecb9bd2bd
SHA512511cb5dabca9ace7c369e77510428a7144824a53894af42cba04ada12884228a14747f1b4e87ed6aa10d0101ee90567c3c873fd33c8450f8ccc3892b4cf669ea
-
Filesize
55KB
MD50dbad8bd336bf6e2bec7a323a1162c7b
SHA1adb907702c963f8aa7e2580a93a89f62139cc013
SHA25609faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047
SHA512b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b
-
Filesize
55KB
MD50dbad8bd336bf6e2bec7a323a1162c7b
SHA1adb907702c963f8aa7e2580a93a89f62139cc013
SHA25609faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047
SHA512b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b
-
Filesize
28KB
MD53ed009fe337a7081b5d8b6ab558779ea
SHA10fab458919e434f2ee62d4513521bb795fa4a6a3
SHA256241612ebc1cb84fa0f2bd663718f35ca9e07f2ff2640ffe113afe3cecb9bd2bd
SHA512511cb5dabca9ace7c369e77510428a7144824a53894af42cba04ada12884228a14747f1b4e87ed6aa10d0101ee90567c3c873fd33c8450f8ccc3892b4cf669ea
-
Filesize
28KB
MD53ed009fe337a7081b5d8b6ab558779ea
SHA10fab458919e434f2ee62d4513521bb795fa4a6a3
SHA256241612ebc1cb84fa0f2bd663718f35ca9e07f2ff2640ffe113afe3cecb9bd2bd
SHA512511cb5dabca9ace7c369e77510428a7144824a53894af42cba04ada12884228a14747f1b4e87ed6aa10d0101ee90567c3c873fd33c8450f8ccc3892b4cf669ea
-
Filesize
14KB
MD5db7180315606402c98b528205c4f5168
SHA17b7c070eb123622d56d43b0ffff6547bc0d5d09a
SHA256824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78
SHA512e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab
-
Filesize
14KB
MD5db7180315606402c98b528205c4f5168
SHA17b7c070eb123622d56d43b0ffff6547bc0d5d09a
SHA256824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78
SHA512e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a
-
Filesize
28KB
MD53ed009fe337a7081b5d8b6ab558779ea
SHA10fab458919e434f2ee62d4513521bb795fa4a6a3
SHA256241612ebc1cb84fa0f2bd663718f35ca9e07f2ff2640ffe113afe3cecb9bd2bd
SHA512511cb5dabca9ace7c369e77510428a7144824a53894af42cba04ada12884228a14747f1b4e87ed6aa10d0101ee90567c3c873fd33c8450f8ccc3892b4cf669ea
-
Filesize
28KB
MD53ed009fe337a7081b5d8b6ab558779ea
SHA10fab458919e434f2ee62d4513521bb795fa4a6a3
SHA256241612ebc1cb84fa0f2bd663718f35ca9e07f2ff2640ffe113afe3cecb9bd2bd
SHA512511cb5dabca9ace7c369e77510428a7144824a53894af42cba04ada12884228a14747f1b4e87ed6aa10d0101ee90567c3c873fd33c8450f8ccc3892b4cf669ea
-
Filesize
55KB
MD50dbad8bd336bf6e2bec7a323a1162c7b
SHA1adb907702c963f8aa7e2580a93a89f62139cc013
SHA25609faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047
SHA512b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b
-
Filesize
55KB
MD50dbad8bd336bf6e2bec7a323a1162c7b
SHA1adb907702c963f8aa7e2580a93a89f62139cc013
SHA25609faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047
SHA512b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a