Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19-01-2023 09:19
Static task
static1
General
-
Target
75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe
-
Size
536KB
-
MD5
8c274dad5fd77b0692ca5c299ffb0d26
-
SHA1
5dda42516b5f3b65093dae4b55506e9c8813d745
-
SHA256
75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8
-
SHA512
370c2b2f4a2342b1d3281e2b8d2a426606e0e828b4342981bcd42b16f78dd071d419d646e3c94292cf11e287347b48f2231de91a21ff2856ea08e2085da335b9
-
SSDEEP
12288:k04p+yRb8qXeSCTQVpyQJPiDZOjVYXRTyyss:k0M8qXzCTQ/yQWRyq
Malware Config
Extracted
quasar
2.1.0.0
Office01
172.81.131.113:4782
VNM_MUTEX_OFUOtYdHQP7Y7fAk1P
-
encryption_key
xufMEowCMSpdPlEx87tq
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
mvscs
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/files/0x000400000001a52a-193.dat disable_win_def behavioral1/files/0x000400000001a52a-230.dat disable_win_def behavioral1/memory/4240-239-0x00000000001F0000-0x000000000027C000-memory.dmp disable_win_def behavioral1/files/0x000600000001ac2e-309.dat disable_win_def behavioral1/files/0x000600000001ac2e-352.dat disable_win_def -
Processes:
vnmtub.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" vnmtub.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" vnmtub.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" vnmtub.exe -
Quasar payload 5 IoCs
Processes:
resource yara_rule behavioral1/files/0x000400000001a52a-193.dat family_quasar behavioral1/files/0x000400000001a52a-230.dat family_quasar behavioral1/memory/4240-239-0x00000000001F0000-0x000000000027C000-memory.dmp family_quasar behavioral1/files/0x000600000001ac2e-309.dat family_quasar behavioral1/files/0x000600000001ac2e-352.dat family_quasar -
Executes dropped EXE 2 IoCs
Processes:
vnmtub.exeClient.exepid Process 4240 vnmtub.exe 4020 Client.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Control Panel\International\Geo\Nation 75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe -
Processes:
vnmtub.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features vnmtub.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" vnmtub.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4876 schtasks.exe 2836 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance 75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exevnmtub.exepid Process 5076 powershell.exe 5076 powershell.exe 5076 powershell.exe 4240 vnmtub.exe 4240 vnmtub.exe 4240 vnmtub.exe 4240 vnmtub.exe 4240 vnmtub.exe 4240 vnmtub.exe 4240 vnmtub.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
vnmtub.exepowershell.exeClient.exedescription pid Process Token: SeDebugPrivilege 4240 vnmtub.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 4020 Client.exe Token: SeDebugPrivilege 4020 Client.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exevnmtub.exeClient.execmd.exedescription pid Process procid_target PID 4124 wrote to memory of 4240 4124 75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe 66 PID 4124 wrote to memory of 4240 4124 75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe 66 PID 4124 wrote to memory of 4240 4124 75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe 66 PID 4240 wrote to memory of 4876 4240 vnmtub.exe 68 PID 4240 wrote to memory of 4876 4240 vnmtub.exe 68 PID 4240 wrote to memory of 4876 4240 vnmtub.exe 68 PID 4240 wrote to memory of 4020 4240 vnmtub.exe 70 PID 4240 wrote to memory of 4020 4240 vnmtub.exe 70 PID 4240 wrote to memory of 4020 4240 vnmtub.exe 70 PID 4240 wrote to memory of 5076 4240 vnmtub.exe 71 PID 4240 wrote to memory of 5076 4240 vnmtub.exe 71 PID 4240 wrote to memory of 5076 4240 vnmtub.exe 71 PID 4020 wrote to memory of 2836 4020 Client.exe 73 PID 4020 wrote to memory of 2836 4020 Client.exe 73 PID 4020 wrote to memory of 2836 4020 Client.exe 73 PID 4240 wrote to memory of 908 4240 vnmtub.exe 75 PID 4240 wrote to memory of 908 4240 vnmtub.exe 75 PID 4240 wrote to memory of 908 4240 vnmtub.exe 75 PID 908 wrote to memory of 1828 908 cmd.exe 77 PID 908 wrote to memory of 1828 908 cmd.exe 77 PID 908 wrote to memory of 1828 908 cmd.exe 77 PID 4240 wrote to memory of 1788 4240 vnmtub.exe 78 PID 4240 wrote to memory of 1788 4240 vnmtub.exe 78 PID 4240 wrote to memory of 1788 4240 vnmtub.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe"C:\Users\Admin\AppData\Local\Temp\75031e206522faaec5981f7cf411472b23ee0508748cd5c1453e390c6facffc8.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\vnmtub.exe"C:\Users\Admin\AppData\Local\Temp\vnmtub.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "mvscs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\vnmtub.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4876
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "mvscs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:2836
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\p7vbd2SWQgm6.bat" "3⤵PID:1788
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203B
MD509b61a4f440fb2d3af75b4fa3687d3e0
SHA1a6ae202c59c34a76fc89631fdba3874b7d1a6ed7
SHA256bd4a6bef809a2e0fd7a484d9b5ef7c794fb18c38dd473702ab5941d1ba4b7fd4
SHA512bfd760f39d9f31d21db2d0614c4818160ac763f6cf66c70d9a947f681b5a66d2c84abc7afe89b625857dff7586f4cc812bccd4a008fe84de4c2bdb9fdd01b62e
-
Filesize
534KB
MD52785b4bbb80b75836c685ac8a1a24f27
SHA132dcef1d5f8e45655478c3dd960e6f9422af691c
SHA2567a845c7bcfd781b09e0da20118f2e396152fc3aae1e77113c8d3adab45077647
SHA512fb7e706bfee26cd2c2036743799d7accd18bd150c1224bee7d42d8d88c196645d39c333e14fb2c00f18ca002c65940dac10072fe242d8d42b4d46a505d63961c
-
Filesize
534KB
MD52785b4bbb80b75836c685ac8a1a24f27
SHA132dcef1d5f8e45655478c3dd960e6f9422af691c
SHA2567a845c7bcfd781b09e0da20118f2e396152fc3aae1e77113c8d3adab45077647
SHA512fb7e706bfee26cd2c2036743799d7accd18bd150c1224bee7d42d8d88c196645d39c333e14fb2c00f18ca002c65940dac10072fe242d8d42b4d46a505d63961c
-
Filesize
534KB
MD52785b4bbb80b75836c685ac8a1a24f27
SHA132dcef1d5f8e45655478c3dd960e6f9422af691c
SHA2567a845c7bcfd781b09e0da20118f2e396152fc3aae1e77113c8d3adab45077647
SHA512fb7e706bfee26cd2c2036743799d7accd18bd150c1224bee7d42d8d88c196645d39c333e14fb2c00f18ca002c65940dac10072fe242d8d42b4d46a505d63961c
-
Filesize
534KB
MD52785b4bbb80b75836c685ac8a1a24f27
SHA132dcef1d5f8e45655478c3dd960e6f9422af691c
SHA2567a845c7bcfd781b09e0da20118f2e396152fc3aae1e77113c8d3adab45077647
SHA512fb7e706bfee26cd2c2036743799d7accd18bd150c1224bee7d42d8d88c196645d39c333e14fb2c00f18ca002c65940dac10072fe242d8d42b4d46a505d63961c