Analysis

  • max time kernel
    102s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 17:30

General

  • Target

    7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe

  • Size

    1.0MB

  • MD5

    1def40ae6fbb8b8f438b7370a6f4ab2d

  • SHA1

    0f59d0792f223b54901e109f5ae98a3ec4acc049

  • SHA256

    7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d

  • SHA512

    f3554bf9d7ba8bd1fbe137c4da19b99a2f486456b3e61e909b3b13af724244d9fe0cf421678d247ceb3934d1c928d203847a4e487f3fcf797cdc45a86ffd599d

  • SSDEEP

    24576:+cvkTLn+3Z3dwNTY8wKxHCtAxlSPU5JpoLww2A716yGGMaYnHfGZgj9h1i:ZvkTD+3Z3ypYNKBIAzSPwD8EQ/q/qgI

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

127.0.0.1:4782

rat94522.ddnsking.com:4000

Mutex

VNM_MUTEX_c2q7y2ayYutZ2XaYe7

Attributes
  • encryption_key

    WIwQFd2V7FhUXFH7QX71

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 13 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar payload 13 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe
    "C:\Users\Admin\AppData\Local\Temp\7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C5C0.tmp\C5C1.tmp\C5C2.bat C:\Users\Admin\AppData\Local\Temp\7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\system32\timeout.exe
        timeout 2
        3⤵
        • Quasar RAT
        • Delays execution with timeout.exe
        PID:1144
      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
        Crypted.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Users\Admin\AppData\Local\Temp\file1.exe
          C:\Users\Admin\AppData\Local\Temp\\file1.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1072
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\VP5As2JylGAA.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1780
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                7⤵
                  PID:1396
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  7⤵
                  • Runs ping.exe
                  PID:1932
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 1416
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1920
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" Get-MpPreference -verbose
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2020
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1772
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
                6⤵
                • Deletes itself
                PID:1184
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\rs5OtCWvFAVM.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:520
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                6⤵
                  PID:1744

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Install Root Certificate

      1
      T1130

      Discovery

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\C5C0.tmp\C5C1.tmp\C5C2.bat
        Filesize

        72B

        MD5

        532fe973c7846cd45dd713eab9ccf5a2

        SHA1

        5c7ffe8a5f2ae88c6edc261e96dcdabbf9c357c6

        SHA256

        704862a14c3b03e464cde36c6dfff69bd6f835638a57ddcda697ccae2eaf620e

        SHA512

        fe3d666e611ab797fee9df860bf1719775d90e32d94b3b7d658c82e7e973790e360fb4294c76c169c4d26603b59347d9387bf0a16e143e69e9a34b7cfd6dfd27

      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
        Filesize

        1.3MB

        MD5

        83a4b7e779273cdd46484d8729de3f60

        SHA1

        379d4fbc70f9c60be123df0625c91d33cdf96b03

        SHA256

        6db7af352ce10f844fb03b03a7caa443bde6bff14bdfc2fc2ee14b67b5700217

        SHA512

        8c0488edd77155c12aaa6529c7eadcd2e9894edb3c50430208e7f8f9bc68c834831c8be14e3a97942d81db8a78347b02bfb99f04a076fdeebb3d943e2e590d71

      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
        Filesize

        1.3MB

        MD5

        83a4b7e779273cdd46484d8729de3f60

        SHA1

        379d4fbc70f9c60be123df0625c91d33cdf96b03

        SHA256

        6db7af352ce10f844fb03b03a7caa443bde6bff14bdfc2fc2ee14b67b5700217

        SHA512

        8c0488edd77155c12aaa6529c7eadcd2e9894edb3c50430208e7f8f9bc68c834831c8be14e3a97942d81db8a78347b02bfb99f04a076fdeebb3d943e2e590d71

      • C:\Users\Admin\AppData\Local\Temp\VP5As2JylGAA.bat
        Filesize

        207B

        MD5

        cc024f9ac71bbb3fd540b897ac8fbcfa

        SHA1

        224793b4ba525cc4b230fb11d2bd4299767b2c04

        SHA256

        f4f572b13a0a8b9a6b1cc05b517231618a1cef69d750eb85edae84b379793b54

        SHA512

        e90f220d201bcbaa39632d0f9d633e0f3860a7b310303abc4702aef088b14c93cf946f3c84d37758a7819b7ddd2050328427eb4639c746f1108829d82c92111e

      • C:\Users\Admin\AppData\Local\Temp\file1.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Local\Temp\file1.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Local\Temp\rs5OtCWvFAVM.bat
        Filesize

        202B

        MD5

        b7147ac070ba8d72323c9c79a98c33aa

        SHA1

        c0436e413a349c27c5335d6d638daa1ab2bcdc42

        SHA256

        2ff4e203abba496e7df8f67b35557177c8875ebb2d23b6c650c7a63d65e41802

        SHA512

        f97b3e63842dfcad5b47531c1bfa4acdb8ccfae1b3bf8f5e67cefe80154d503a46d0ce0316f5daab33295af2b2552b3893900f2f3835750a584b6a2160ed082e

      • C:\Users\Admin\AppData\Local\Temp\version.html
        Filesize

        19B

        MD5

        6d2eb7ff01d1c70656ab0f3869fac94f

        SHA1

        04fe25b56e129532d8fabe557901e39f2977306b

        SHA256

        e8541e5141dfc37099209e4fbdb3c527ba4c8bd81b10fa111a66d2d1bc81c2e2

        SHA512

        1b9fa8b039acd2c84ecd2088470b02857e9b1810f3f55d258f0152513fb33dfdc6758e46fe6ed3e9cabad62015d537d6f7acbf06ee35089e75d3aaff4127e555

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Local\Temp\file1.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe
        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • memory/320-61-0x0000000000330000-0x000000000038E000-memory.dmp
        Filesize

        376KB

      • memory/320-59-0x0000000000000000-mapping.dmp
      • memory/520-93-0x0000000000000000-mapping.dmp
      • memory/1072-75-0x0000000000130000-0x00000000001BC000-memory.dmp
        Filesize

        560KB

      • memory/1072-71-0x0000000000000000-mapping.dmp
      • memory/1144-57-0x0000000000000000-mapping.dmp
      • memory/1184-92-0x0000000000000000-mapping.dmp
      • memory/1396-83-0x0000000000000000-mapping.dmp
      • memory/1540-55-0x0000000000000000-mapping.dmp
      • memory/1680-68-0x0000000000120000-0x00000000001AC000-memory.dmp
        Filesize

        560KB

      • memory/1680-65-0x0000000000000000-mapping.dmp
      • memory/1744-95-0x0000000000000000-mapping.dmp
      • memory/1772-90-0x0000000000000000-mapping.dmp
      • memory/1780-81-0x0000000000000000-mapping.dmp
      • memory/1920-85-0x0000000000000000-mapping.dmp
      • memory/1932-84-0x0000000000000000-mapping.dmp
      • memory/2004-54-0x0000000076201000-0x0000000076203000-memory.dmp
        Filesize

        8KB

      • memory/2020-80-0x000000006F200000-0x000000006F7AB000-memory.dmp
        Filesize

        5.7MB

      • memory/2020-79-0x000000006F200000-0x000000006F7AB000-memory.dmp
        Filesize

        5.7MB

      • memory/2020-78-0x000000006F200000-0x000000006F7AB000-memory.dmp
        Filesize

        5.7MB

      • memory/2020-74-0x0000000000000000-mapping.dmp