Analysis
-
max time kernel
129s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2022 14:13
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe
-
Size
9KB
-
MD5
fd3c284eb862dfd89e4ea9c3188184b0
-
SHA1
99b066e1b2bb568fb6d1813a2e06970cf164aec1
-
SHA256
491c807f26e695af9ea8cb18cfbee96446d4f6703f774269a36cd887561dae8d
-
SHA512
3a455fbd2dda97ee0afdbe55c4fc0f08aa2444c9a246d5b8f44709b276abf52fee7f9285099314b0afa4cedac194effe5d6d9e9c9255c31c95a1dc6c31571e74
-
SSDEEP
192:K0E+Ig32cL1UuZRSrTW/2c8stYcFmVc03KY:K0E+Ig32cLWISrTWOcptYcFmVc03K
Malware Config
Extracted
quasar
1.3.0.0
Nov
37.139.128.94:5000
QSR_MUTEX_eZnYtXesrHquJP9u21
-
encryption_key
cnjVAVdqAEtq3rq2N0WD
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2456-160-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 3668 Vfkxoptombfioubttqtvzsu.exe 2456 Vfkxoptombfioubttqtvzsu.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Vfkxoptombfioubttqtvzsu.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Aojxzl = "\"C:\\Users\\Admin\\AppData\\Roaming\\Fqqzc\\Aojxzl.exe\"" SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Aojxzl = "\"C:\\Users\\Admin\\AppData\\Roaming\\Fqqzc\\Aojxzl.exe\"" Vfkxoptombfioubttqtvzsu.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 api.ipify.org 40 api.ipify.org 44 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 384 set thread context of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 3668 set thread context of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 820 powershell.exe 820 powershell.exe 3720 powershell.exe 3720 powershell.exe 1004 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 1004 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 1004 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe Token: SeDebugPrivilege 820 powershell.exe Token: SeDebugPrivilege 3668 Vfkxoptombfioubttqtvzsu.exe Token: SeDebugPrivilege 1004 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe Token: SeDebugPrivilege 3720 powershell.exe Token: SeDebugPrivilege 2456 Vfkxoptombfioubttqtvzsu.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2456 Vfkxoptombfioubttqtvzsu.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 384 wrote to memory of 820 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 79 PID 384 wrote to memory of 820 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 79 PID 384 wrote to memory of 820 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 79 PID 384 wrote to memory of 3668 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 88 PID 384 wrote to memory of 3668 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 88 PID 384 wrote to memory of 3668 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 88 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 384 wrote to memory of 1004 384 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe 89 PID 3668 wrote to memory of 3720 3668 Vfkxoptombfioubttqtvzsu.exe 90 PID 3668 wrote to memory of 3720 3668 Vfkxoptombfioubttqtvzsu.exe 90 PID 3668 wrote to memory of 3720 3668 Vfkxoptombfioubttqtvzsu.exe 90 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 PID 3668 wrote to memory of 2456 3668 Vfkxoptombfioubttqtvzsu.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\Vfkxoptombfioubttqtvzsu.exe"C:\Users\Admin\AppData\Local\Temp\Vfkxoptombfioubttqtvzsu.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\Vfkxoptombfioubttqtvzsu.exeC:\Users\Admin\AppData\Local\Temp\Vfkxoptombfioubttqtvzsu.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.DownLoaderNET.495.22282.26470.exe.log
Filesize1KB
MD5026fb31495d30e5dbfd00f398c2efbf8
SHA19cda8f5f58129e4d592ca1b9867835c86f38ab1b
SHA256b008f16eeae90b4c6ba119fb308616c0795cdaca51adf2b64470a0c01aeeb8b7
SHA5126d1cc01c90613522cfb7be7ea67ff03732b367dfc7bfd245ad6d7ea8e5e5def431b3339d17893b7b193cee2c3b4c22a459acd3d852ee88fce711e30c5af195a1
-
Filesize
1KB
MD5026fb31495d30e5dbfd00f398c2efbf8
SHA19cda8f5f58129e4d592ca1b9867835c86f38ab1b
SHA256b008f16eeae90b4c6ba119fb308616c0795cdaca51adf2b64470a0c01aeeb8b7
SHA5126d1cc01c90613522cfb7be7ea67ff03732b367dfc7bfd245ad6d7ea8e5e5def431b3339d17893b7b193cee2c3b4c22a459acd3d852ee88fce711e30c5af195a1
-
Filesize
1KB
MD50f53674af0c42551f18bc45e0b21bf4c
SHA12a9020c08a5ffddc575f47aa0a6cb3b2afc16105
SHA2563a3d70d7800b5170d3112cfdc66b3b8a021c167f8e33eb1e10235d6aec961c4e
SHA512a3209e5ce88836811c39a15713d74c4cf868da3c2da9fc8b0f52a3e1ab3ffde1cf9e3cbf6b8c2c2f9507c25d8a4a1d58c9b8c846dcc2bf8626bcae0ef71cf457
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD53994c504d75aa4ad59c718b2f0d2d44c
SHA1e597e6dbe7f691412769b688e2d39f63339eca04
SHA256231667a2278c5283712257ffb5b45ade707a356e375ce32bb750974c11de52f3
SHA512653860d40560ddf328d2e5a2beb6ab9e1699c2ebe377d76a5c251f77a7323ed7dceb85a2e8e776290bde8f9a75c60817878475f781254fc2065c8e013b310173
-
Filesize
10KB
MD50e57c129a02db3868073f0599d116add
SHA12ade42da4df63238869acf8cc1cde7392cd9c225
SHA2567f16d3351df72f2f49118adc25ca967e5e7e9e942b7da024b63e88d8b224c9b4
SHA512964e7e5a9c2d39dc783ababba54d44b98411da6aa9bdb0cc40947fd85a2774a3a8461ec25b79e3387f4fab7e51194f4d8b4ac7b00c356dafe3de221041fa01bf
-
Filesize
10KB
MD50e57c129a02db3868073f0599d116add
SHA12ade42da4df63238869acf8cc1cde7392cd9c225
SHA2567f16d3351df72f2f49118adc25ca967e5e7e9e942b7da024b63e88d8b224c9b4
SHA512964e7e5a9c2d39dc783ababba54d44b98411da6aa9bdb0cc40947fd85a2774a3a8461ec25b79e3387f4fab7e51194f4d8b4ac7b00c356dafe3de221041fa01bf
-
Filesize
10KB
MD50e57c129a02db3868073f0599d116add
SHA12ade42da4df63238869acf8cc1cde7392cd9c225
SHA2567f16d3351df72f2f49118adc25ca967e5e7e9e942b7da024b63e88d8b224c9b4
SHA512964e7e5a9c2d39dc783ababba54d44b98411da6aa9bdb0cc40947fd85a2774a3a8461ec25b79e3387f4fab7e51194f4d8b4ac7b00c356dafe3de221041fa01bf