Analysis

  • max time kernel
    143s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 08:08

General

  • Target

    Pago.exe

  • Size

    1.3MB

  • MD5

    ce7d806c0c013d7a322071cb5e9d3ab7

  • SHA1

    becd8d9257efa5df71f3a49edb5ea07da0511755

  • SHA256

    f47fae36937dabb1c97098581deb76302b10f5abdf77971626813dd158af341c

  • SHA512

    c84c4c99cf9b986c06208ea6a283f5de67dd38f65d1344b9b7d03ce1ea19f03aa67c8467e0e454febc7532b4e82ccf908c73c740f2f54eb32cf13cddf14544ec

  • SSDEEP

    24576:rGHCm8uPdJAg804Aa24gOYtHzl0GXtiHpH1uYIq3U/l5MHTU:quWpZt51oJklCzU

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

yop

C2

dnuocc.com:64594

www.dnuocc.com:64594

Mutex

QSR_MUTEX_OyCjWKeFudCMEKYeJX

Attributes
  • encryption_key

    In08tDaU6GKdLZ8HdsU1

  • install_name

    yors.exe

  • log_directory

    Logs

  • reconnect_delay

    7000

  • startup_key

    crdm

  • subdirectory

    yilk

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pago.exe
    "C:\Users\Admin\AppData\Local\Temp\Pago.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\xvxfd.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Roaming\xvxfd.sfx.exe
        xvxfd.sfx.exe -pgdpodHghkffiqewhkenfukjvcfjmvzgdbwvhlnbmcgjSKrgqdkfWEgunyngfionJjgbghjfmfhncknnsRumcjuzycGfhfjmfgjkfbracncgvoGgcjfimaabihqmkjkf -dC:\Users\Admin\AppData\Roaming
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Users\Admin\AppData\Roaming\xvxfd.exe
          "C:\Users\Admin\AppData\Roaming\xvxfd.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4940
          • C:\Users\Admin\AppData\Roaming\xvxfd.exe
            C:\Users\Admin\AppData\Roaming\xvxfd.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1608
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "crdm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\xvxfd.exe" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:744
            • C:\Users\Admin\AppData\Roaming\yilk\yors.exe
              "C:\Users\Admin\AppData\Roaming\yilk\yors.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3256
              • C:\Users\Admin\AppData\Roaming\yilk\yors.exe
                C:\Users\Admin\AppData\Roaming\yilk\yors.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:632
                • C:\Windows\SysWOW64\schtasks.exe
                  "schtasks" /create /tn "crdm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\yilk\yors.exe" /rl HIGHEST /f
                  8⤵
                  • Creates scheduled task(s)
                  PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xvxfd.exe.log

    Filesize

    706B

    MD5

    d95c58e609838928f0f49837cab7dfd2

    SHA1

    55e7139a1e3899195b92ed8771d1ca2c7d53c916

    SHA256

    0407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339

    SHA512

    405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yors.exe.log

    Filesize

    706B

    MD5

    d95c58e609838928f0f49837cab7dfd2

    SHA1

    55e7139a1e3899195b92ed8771d1ca2c7d53c916

    SHA256

    0407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339

    SHA512

    405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d

  • C:\Users\Admin\AppData\Roaming\xvxfd.bat

    Filesize

    155B

    MD5

    48cc12502ba67cc623b77406fe8b4d3f

    SHA1

    64eb6494433226399f0bff9f21971d054adc93b2

    SHA256

    d5df28c2161494f02dcb9e672927c74aa66f2c390668000f0cbc65fa2307e8d2

    SHA512

    0da2192987fee8ae2c5d694c8768574728f10a3e2380c531f5ba4493e9dede2dad243d55c3fa32400b49e42d7c1189ebfa7c77225697c6f37a1d927e5096442c

  • C:\Users\Admin\AppData\Roaming\xvxfd.exe

    Filesize

    1.1MB

    MD5

    237faeb4da1c41cbce2ed05373fb0a99

    SHA1

    d013d2c627cae478c8b3c8c0b866ce9a4ff3f29b

    SHA256

    06a4b87db460ec80e2585b05d07c9ca022a8a50621f6f48f81776b8d634cbc86

    SHA512

    0aa021103959ca48cd1226f5f0925adde886087c263de74efca00c56eb0c73be68b19ea5705bccbc11bd8e807a9f10a649575dfd8d3ebe694c0c66db8404c100

  • C:\Users\Admin\AppData\Roaming\xvxfd.exe

    Filesize

    1.1MB

    MD5

    237faeb4da1c41cbce2ed05373fb0a99

    SHA1

    d013d2c627cae478c8b3c8c0b866ce9a4ff3f29b

    SHA256

    06a4b87db460ec80e2585b05d07c9ca022a8a50621f6f48f81776b8d634cbc86

    SHA512

    0aa021103959ca48cd1226f5f0925adde886087c263de74efca00c56eb0c73be68b19ea5705bccbc11bd8e807a9f10a649575dfd8d3ebe694c0c66db8404c100

  • C:\Users\Admin\AppData\Roaming\xvxfd.exe

    Filesize

    1.1MB

    MD5

    237faeb4da1c41cbce2ed05373fb0a99

    SHA1

    d013d2c627cae478c8b3c8c0b866ce9a4ff3f29b

    SHA256

    06a4b87db460ec80e2585b05d07c9ca022a8a50621f6f48f81776b8d634cbc86

    SHA512

    0aa021103959ca48cd1226f5f0925adde886087c263de74efca00c56eb0c73be68b19ea5705bccbc11bd8e807a9f10a649575dfd8d3ebe694c0c66db8404c100

  • C:\Users\Admin\AppData\Roaming\xvxfd.sfx.exe

    Filesize

    1.1MB

    MD5

    b574bd5cba33268ebe659b2c5ecebcd0

    SHA1

    404bd0181b06f2959d30147ade6282c3fde0b2e8

    SHA256

    0a959900f85b4ce16162922803176e9a587931ab36347f2217a5e542c2578191

    SHA512

    a96e283e6ad4aae467e3c95337173246dbf3878c098a83981c4fd384f99bb6d2ee040f0af34081222f22947e9e29943eff48d850a63f3030aee1dcfead16ab6e

  • C:\Users\Admin\AppData\Roaming\xvxfd.sfx.exe

    Filesize

    1.1MB

    MD5

    b574bd5cba33268ebe659b2c5ecebcd0

    SHA1

    404bd0181b06f2959d30147ade6282c3fde0b2e8

    SHA256

    0a959900f85b4ce16162922803176e9a587931ab36347f2217a5e542c2578191

    SHA512

    a96e283e6ad4aae467e3c95337173246dbf3878c098a83981c4fd384f99bb6d2ee040f0af34081222f22947e9e29943eff48d850a63f3030aee1dcfead16ab6e

  • C:\Users\Admin\AppData\Roaming\yilk\yors.exe

    Filesize

    1.1MB

    MD5

    237faeb4da1c41cbce2ed05373fb0a99

    SHA1

    d013d2c627cae478c8b3c8c0b866ce9a4ff3f29b

    SHA256

    06a4b87db460ec80e2585b05d07c9ca022a8a50621f6f48f81776b8d634cbc86

    SHA512

    0aa021103959ca48cd1226f5f0925adde886087c263de74efca00c56eb0c73be68b19ea5705bccbc11bd8e807a9f10a649575dfd8d3ebe694c0c66db8404c100

  • C:\Users\Admin\AppData\Roaming\yilk\yors.exe

    Filesize

    1.1MB

    MD5

    237faeb4da1c41cbce2ed05373fb0a99

    SHA1

    d013d2c627cae478c8b3c8c0b866ce9a4ff3f29b

    SHA256

    06a4b87db460ec80e2585b05d07c9ca022a8a50621f6f48f81776b8d634cbc86

    SHA512

    0aa021103959ca48cd1226f5f0925adde886087c263de74efca00c56eb0c73be68b19ea5705bccbc11bd8e807a9f10a649575dfd8d3ebe694c0c66db8404c100

  • C:\Users\Admin\AppData\Roaming\yilk\yors.exe

    Filesize

    1.1MB

    MD5

    237faeb4da1c41cbce2ed05373fb0a99

    SHA1

    d013d2c627cae478c8b3c8c0b866ce9a4ff3f29b

    SHA256

    06a4b87db460ec80e2585b05d07c9ca022a8a50621f6f48f81776b8d634cbc86

    SHA512

    0aa021103959ca48cd1226f5f0925adde886087c263de74efca00c56eb0c73be68b19ea5705bccbc11bd8e807a9f10a649575dfd8d3ebe694c0c66db8404c100

  • memory/320-134-0x0000000000000000-mapping.dmp

  • memory/632-160-0x00000000066E0000-0x00000000066EA000-memory.dmp

    Filesize

    40KB

  • memory/632-155-0x0000000000000000-mapping.dmp

  • memory/744-150-0x0000000000000000-mapping.dmp

  • memory/1608-148-0x00000000067C0000-0x00000000067D2000-memory.dmp

    Filesize

    72KB

  • memory/1608-149-0x0000000006D20000-0x0000000006D5C000-memory.dmp

    Filesize

    240KB

  • memory/1608-147-0x0000000005AC0000-0x0000000005B26000-memory.dmp

    Filesize

    408KB

  • memory/1608-145-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1608-144-0x0000000000000000-mapping.dmp

  • memory/1988-159-0x0000000000000000-mapping.dmp

  • memory/2880-132-0x0000000000000000-mapping.dmp

  • memory/3256-151-0x0000000000000000-mapping.dmp

  • memory/4940-137-0x0000000000000000-mapping.dmp

  • memory/4940-143-0x00000000082B0000-0x0000000008342000-memory.dmp

    Filesize

    584KB

  • memory/4940-142-0x00000000087C0000-0x0000000008D64000-memory.dmp

    Filesize

    5.6MB

  • memory/4940-141-0x0000000008170000-0x000000000820C000-memory.dmp

    Filesize

    624KB

  • memory/4940-140-0x0000000000E20000-0x0000000000F3E000-memory.dmp

    Filesize

    1.1MB