Analysis

  • max time kernel
    48s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2022 18:08

General

  • Target

    ODEME.exe

  • Size

    1.8MB

  • MD5

    e40f64fd383df33b756de97b76508dc4

  • SHA1

    8ea35ba8262b532748633d555ef1a5b5fb219562

  • SHA256

    408c78bbd01630d88293c29b2dd137277d76cfb8c34dfc3de52e3f70f92d0d38

  • SHA512

    cccbbb34e768cab2b4ffeede69536b068e60789738a74f2b6fcc3628ba0b6e89d4b3d2dbc3400e33258505fddbbcefcc02a9eb41acea0822c175dc7a16f17b2f

  • SSDEEP

    24576:bGHCm8uPdJdbmQGE6GnkKsTgV7OlsUpQpqmjVxMebNVzNFm0TSG:auWBiEHs8VGs0Qsmpyeb32G

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

top

C2

dnuocc.com:64594

www.dnuocc.com:64594

Mutex

QSR_MUTEX_NKzsG6279pND1MmPDw

Attributes
  • encryption_key

    6c7zzdS2IXrGaCb9wrMU

  • install_name

    tors.exe

  • log_directory

    Logs

  • reconnect_delay

    5000

  • startup_key

    tdm

  • subdirectory

    tilk

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 5 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ODEME.exe
    "C:\Users\Admin\AppData\Local\Temp\ODEME.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\gfxgx.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Local\Temp\gfxgx.sfx.exe
        gfxgx.sfx.exe -pyqdkffiqncmcjufgjkflgfhfjgukjvcghjfjcGHmfgkfughkfjumkSKrgbfknnsracznyvoGgfmfcgjhmvzgnbmgcjfbncgdpodnfionJjgimaabihqgdbwvhewhken -dC:\Users\Admin\AppData\Roaming
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Users\Admin\AppData\Roaming\gfxgx.exe
          "C:\Users\Admin\AppData\Roaming\gfxgx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Users\Admin\AppData\Roaming\gfxgx.exe
            C:\Users\Admin\AppData\Roaming\gfxgx.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1048
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "tdm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\gfxgx.exe" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:1200
            • C:\Users\Admin\AppData\Roaming\tilk\tors.exe
              "C:\Users\Admin\AppData\Roaming\tilk\tors.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1336
              • C:\Users\Admin\AppData\Roaming\tilk\tors.exe
                C:\Users\Admin\AppData\Roaming\tilk\tors.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:816
                • C:\Windows\SysWOW64\schtasks.exe
                  "schtasks" /create /tn "tdm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\tilk\tors.exe" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1120

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gfxgx.bat
    Filesize

    155B

    MD5

    9d4164a125a4f7d232458f0a6cddbdfb

    SHA1

    23ca2c2908a97b2543fa1e0241189d3a4676ca84

    SHA256

    47c8ed3502b9de43a918da9abdf6f708ca5fc44febb3ab16314ff2b0aad55afd

    SHA512

    0f4b499bfdbafd6fda1dcaa7821443d74f8421b3b587264ad992586b3312a9b1a2e2e19d4739b31e93289e90cd5bc0be48e8f17645a42cc274ea044aa9542225

  • C:\Users\Admin\AppData\Local\Temp\gfxgx.sfx.exe
    Filesize

    1.2MB

    MD5

    50fc280c07ded77779e61a87a3d861fe

    SHA1

    f025a667489005ac753064e5eb494abe46a97393

    SHA256

    f4dff2c58d583ed5f7e21c505b788aca5f82f6a173f293acf615fdf10e7c9169

    SHA512

    dc42373945d9e43eb45470653de06e74d56fb8ff54d2c0f64509724f08b45440300c7fcccc64838fb0937bbbf13329198c524fdd949c3ea89ba715b80d87c666

  • C:\Users\Admin\AppData\Local\Temp\gfxgx.sfx.exe
    Filesize

    1.2MB

    MD5

    50fc280c07ded77779e61a87a3d861fe

    SHA1

    f025a667489005ac753064e5eb494abe46a97393

    SHA256

    f4dff2c58d583ed5f7e21c505b788aca5f82f6a173f293acf615fdf10e7c9169

    SHA512

    dc42373945d9e43eb45470653de06e74d56fb8ff54d2c0f64509724f08b45440300c7fcccc64838fb0937bbbf13329198c524fdd949c3ea89ba715b80d87c666

  • C:\Users\Admin\AppData\Roaming\gfxgx.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • C:\Users\Admin\AppData\Roaming\gfxgx.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • C:\Users\Admin\AppData\Roaming\gfxgx.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • C:\Users\Admin\AppData\Roaming\tilk\tors.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • C:\Users\Admin\AppData\Roaming\tilk\tors.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • C:\Users\Admin\AppData\Roaming\tilk\tors.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • \Users\Admin\AppData\Local\Temp\gfxgx.sfx.exe
    Filesize

    1.2MB

    MD5

    50fc280c07ded77779e61a87a3d861fe

    SHA1

    f025a667489005ac753064e5eb494abe46a97393

    SHA256

    f4dff2c58d583ed5f7e21c505b788aca5f82f6a173f293acf615fdf10e7c9169

    SHA512

    dc42373945d9e43eb45470653de06e74d56fb8ff54d2c0f64509724f08b45440300c7fcccc64838fb0937bbbf13329198c524fdd949c3ea89ba715b80d87c666

  • \Users\Admin\AppData\Roaming\gfxgx.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • \Users\Admin\AppData\Roaming\gfxgx.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • \Users\Admin\AppData\Roaming\gfxgx.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • \Users\Admin\AppData\Roaming\gfxgx.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • \Users\Admin\AppData\Roaming\tilk\tors.exe
    Filesize

    1.2MB

    MD5

    45c405bb47177a4ecdd9bc5ff88923eb

    SHA1

    a8605148e035dca5ce970d99fdb12d86f70eeef8

    SHA256

    e0be8a13f930fd4d337b7df74e3bd4bac4d9f1cf8fea0c46ce1ce066ed40d8aa

    SHA512

    b28043255d5c5f2f64de4359d57c45fccc82b04460c6a27ccd49841646b3ee84565098bfa6ab6f09d0dc835dc54665d4273e144a0fb5e3c61a10151b6803d210

  • memory/112-54-0x0000000074C11000-0x0000000074C13000-memory.dmp
    Filesize

    8KB

  • memory/816-88-0x00000000004581BE-mapping.dmp
  • memory/1048-79-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/1048-73-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/1048-74-0x00000000004581BE-mapping.dmp
  • memory/1048-77-0x0000000000400000-0x000000000045E000-memory.dmp
    Filesize

    376KB

  • memory/1120-95-0x0000000000000000-mapping.dmp
  • memory/1124-59-0x0000000000000000-mapping.dmp
  • memory/1200-81-0x0000000000000000-mapping.dmp
  • memory/1336-86-0x00000000013E0000-0x0000000001516000-memory.dmp
    Filesize

    1.2MB

  • memory/1336-83-0x0000000000000000-mapping.dmp
  • memory/1792-55-0x0000000000000000-mapping.dmp
  • memory/2044-69-0x0000000001140000-0x0000000001276000-memory.dmp
    Filesize

    1.2MB

  • memory/2044-66-0x0000000000000000-mapping.dmp
  • memory/2044-70-0x0000000000280000-0x0000000000286000-memory.dmp
    Filesize

    24KB

  • memory/2044-72-0x00000000003A0000-0x00000000003A6000-memory.dmp
    Filesize

    24KB

  • memory/2044-71-0x0000000007F80000-0x00000000080CA000-memory.dmp
    Filesize

    1.3MB