Analysis

  • max time kernel
    149s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 13:49

General

  • Target

    e14fe9800b600ce61b06794233aa47d6fbbc20d18dbb1e531c5deaac995bbca8.exe

  • Size

    590KB

  • MD5

    f7d70adb404cf63562d6541fce16ee94

  • SHA1

    7c855ae562c54c6747c682f9403ff902308deeb1

  • SHA256

    e14fe9800b600ce61b06794233aa47d6fbbc20d18dbb1e531c5deaac995bbca8

  • SHA512

    aed0a69aa45018197f04eec259ab4954f0ecd6f0e309a745346282cc46efd4e6567f920a3cfa39326082abff40de6ad932150ae5f6207e1a580d87343410d519

  • SSDEEP

    6144:kU9/iRCAm9wyitWVSIyIXQR3YQJrjYPUotecWo7vMyYp5lQj64cmX3Hrv9Otawza:i3ynm3RsPj7WYUxp+TvotLzAFLBz8LS

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

RAT

C2

23.105.131.178:7812

Mutex

VNM_MUTEX_gdy9bWxR0te3WgTRnI

Attributes
  • encryption_key

    MDXzdQumRqZGIeya7nG9

  • install_name

    Windows Defender Security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    Microsoft

Signatures

  • Contains code to disable Windows Defender 8 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 8 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e14fe9800b600ce61b06794233aa47d6fbbc20d18dbb1e531c5deaac995bbca8.exe
    "C:\Users\Admin\AppData\Local\Temp\e14fe9800b600ce61b06794233aa47d6fbbc20d18dbb1e531c5deaac995bbca8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
      "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1756
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1396
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:1688
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:908
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
          4⤵
          • Deletes itself
          PID:1572
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\NpXXHwrWMKQ4.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NpXXHwrWMKQ4.bat

      Filesize

      219B

      MD5

      e9bcfae5edf4bd23c9bbae44a20b4c4b

      SHA1

      dfcf99cce749fb770a2d583f938f09677cb0c256

      SHA256

      97fdd89d887f607eba888a2034969f2b9ad10f4fe66c3bd52b9419638f33b5d8

      SHA512

      44c53589173263e0a87905869cad76bd87934676344ee17b10543c322abc9ca3c6469abeba109a2c7465989e75e5f332522911c0e85c473a8333e0dcb4cb163b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe

      Filesize

      535KB

      MD5

      6f3b107a20b18244efb6473bae2544b1

      SHA1

      dc02ec107547c515bffeadcd87e6308c3bdfd390

      SHA256

      2b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0

      SHA512

      318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe

      Filesize

      535KB

      MD5

      6f3b107a20b18244efb6473bae2544b1

      SHA1

      dc02ec107547c515bffeadcd87e6308c3bdfd390

      SHA256

      2b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0

      SHA512

      318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c

    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe

      Filesize

      535KB

      MD5

      6f3b107a20b18244efb6473bae2544b1

      SHA1

      dc02ec107547c515bffeadcd87e6308c3bdfd390

      SHA256

      2b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0

      SHA512

      318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c

    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe

      Filesize

      535KB

      MD5

      6f3b107a20b18244efb6473bae2544b1

      SHA1

      dc02ec107547c515bffeadcd87e6308c3bdfd390

      SHA256

      2b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0

      SHA512

      318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c

    • \Users\Admin\AppData\Roaming\Microsoft\Windows Defender Security.exe

      Filesize

      535KB

      MD5

      6f3b107a20b18244efb6473bae2544b1

      SHA1

      dc02ec107547c515bffeadcd87e6308c3bdfd390

      SHA256

      2b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0

      SHA512

      318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c

    • \Users\Admin\AppData\Roaming\Windows Defender Security.exe

      Filesize

      535KB

      MD5

      6f3b107a20b18244efb6473bae2544b1

      SHA1

      dc02ec107547c515bffeadcd87e6308c3bdfd390

      SHA256

      2b23c8f0299f92a4ba0f7d4eea26316cf2ffae2eaf41767ce452464c9951b2a0

      SHA512

      318b51a7bc6a37f9a4d2ee528d66124b541c9d3f2002ad7a15456071fe090cdb264f6439dbc3fa5471200d2faf5217d01af56b3eafa2830917480b080d31161c

    • memory/604-58-0x0000000000000000-mapping.dmp

    • memory/604-62-0x0000000000A90000-0x0000000000B1C000-memory.dmp

      Filesize

      560KB

    • memory/668-80-0x0000000000000000-mapping.dmp

    • memory/908-75-0x000000006EBB0000-0x000000006F15B000-memory.dmp

      Filesize

      5.7MB

    • memory/908-72-0x0000000000000000-mapping.dmp

    • memory/908-74-0x000000006EBB0000-0x000000006F15B000-memory.dmp

      Filesize

      5.7MB

    • memory/944-78-0x0000000000000000-mapping.dmp

    • memory/1396-69-0x00000000003E0000-0x000000000046C000-memory.dmp

      Filesize

      560KB

    • memory/1396-66-0x0000000000000000-mapping.dmp

    • memory/1572-77-0x0000000000000000-mapping.dmp

    • memory/1596-76-0x0000000000000000-mapping.dmp

    • memory/1688-71-0x0000000000000000-mapping.dmp

    • memory/1756-64-0x0000000000000000-mapping.dmp

    • memory/2040-61-0x0000000074610000-0x0000000074BBB000-memory.dmp

      Filesize

      5.7MB

    • memory/2040-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

      Filesize

      8KB

    • memory/2040-56-0x0000000074610000-0x0000000074BBB000-memory.dmp

      Filesize

      5.7MB

    • memory/2040-55-0x0000000074610000-0x0000000074BBB000-memory.dmp

      Filesize

      5.7MB