Analysis
-
max time kernel
20s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:30
Static task
static1
Behavioral task
behavioral1
Sample
7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe
Resource
win7-20221111-en
General
-
Target
7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe
-
Size
1.0MB
-
MD5
1def40ae6fbb8b8f438b7370a6f4ab2d
-
SHA1
0f59d0792f223b54901e109f5ae98a3ec4acc049
-
SHA256
7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d
-
SHA512
f3554bf9d7ba8bd1fbe137c4da19b99a2f486456b3e61e909b3b13af724244d9fe0cf421678d247ceb3934d1c928d203847a4e487f3fcf797cdc45a86ffd599d
-
SSDEEP
24576:+cvkTLn+3Z3dwNTY8wKxHCtAxlSPU5JpoLww2A716yGGMaYnHfGZgj9h1i:ZvkTD+3Z3ypYNKBIAzSPwD8EQ/q/qgI
Malware Config
Extracted
quasar
2.1.0.0
Office04
127.0.0.1:4782
rat94522.ddnsking.com:4000
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
WIwQFd2V7FhUXFH7QX71
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\file1.exe disable_win_def C:\Users\Admin\AppData\Local\Temp\file1.exe disable_win_def behavioral2/memory/1844-148-0x0000000000FA0000-0x000000000102C000-memory.dmp disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def -
Processes:
file1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" file1.exe -
Quasar payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\file1.exe family_quasar C:\Users\Admin\AppData\Local\Temp\file1.exe family_quasar behavioral2/memory/1844-148-0x0000000000FA0000-0x000000000102C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Executes dropped EXE 3 IoCs
Processes:
Crypted.exefile1.exeClient.exepid process 1156 Crypted.exe 1844 file1.exe 5056 Client.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Client.exe7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exefile1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation file1.exe -
Processes:
file1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" file1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2704 5056 WerFault.exe Client.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5048 timeout.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exefile1.exepid process 1396 powershell.exe 1396 powershell.exe 1844 file1.exe 1844 file1.exe 1844 file1.exe 1844 file1.exe 1844 file1.exe 1844 file1.exe 1844 file1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
file1.exepowershell.exeClient.exedescription pid process Token: SeDebugPrivilege 1844 file1.exe Token: SeDebugPrivilege 1396 powershell.exe Token: SeDebugPrivilege 5056 Client.exe Token: SeDebugPrivilege 5056 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 5056 Client.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.execmd.exeCrypted.exefile1.execmd.exeClient.exedescription pid process target process PID 4992 wrote to memory of 3784 4992 7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe cmd.exe PID 4992 wrote to memory of 3784 4992 7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe cmd.exe PID 3784 wrote to memory of 5048 3784 cmd.exe timeout.exe PID 3784 wrote to memory of 5048 3784 cmd.exe timeout.exe PID 3784 wrote to memory of 1156 3784 cmd.exe Crypted.exe PID 3784 wrote to memory of 1156 3784 cmd.exe Crypted.exe PID 3784 wrote to memory of 1156 3784 cmd.exe Crypted.exe PID 1156 wrote to memory of 1844 1156 Crypted.exe file1.exe PID 1156 wrote to memory of 1844 1156 Crypted.exe file1.exe PID 1156 wrote to memory of 1844 1156 Crypted.exe file1.exe PID 1844 wrote to memory of 5056 1844 file1.exe Client.exe PID 1844 wrote to memory of 5056 1844 file1.exe Client.exe PID 1844 wrote to memory of 5056 1844 file1.exe Client.exe PID 1844 wrote to memory of 1396 1844 file1.exe powershell.exe PID 1844 wrote to memory of 1396 1844 file1.exe powershell.exe PID 1844 wrote to memory of 1396 1844 file1.exe powershell.exe PID 1844 wrote to memory of 1988 1844 file1.exe cmd.exe PID 1844 wrote to memory of 1988 1844 file1.exe cmd.exe PID 1844 wrote to memory of 1988 1844 file1.exe cmd.exe PID 1844 wrote to memory of 4704 1844 file1.exe cmd.exe PID 1844 wrote to memory of 4704 1844 file1.exe cmd.exe PID 1844 wrote to memory of 4704 1844 file1.exe cmd.exe PID 1988 wrote to memory of 1820 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1820 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1820 1988 cmd.exe cmd.exe PID 5056 wrote to memory of 4128 5056 Client.exe cmd.exe PID 5056 wrote to memory of 4128 5056 Client.exe cmd.exe PID 5056 wrote to memory of 4128 5056 Client.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe"C:\Users\Admin\AppData\Local\Temp\7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C950.tmp\C951.tmp\C952.bat C:\Users\Admin\AppData\Local\Temp\7cbcebf57f666bc42f8e6b3bba459cf968d19690e7d983e943b77fb97acb487d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\Crypted.exeCrypted.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\file1.exeC:\Users\Admin\AppData\Local\Temp\\file1.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\O8j1oGiR7QL9.bat" "6⤵PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 22366⤵
- Program crash
PID:2704
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit5⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*6⤵PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NdVis7bJuWdq.bat" "5⤵PID:4704
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 5056 -ip 50561⤵PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5532fe973c7846cd45dd713eab9ccf5a2
SHA15c7ffe8a5f2ae88c6edc261e96dcdabbf9c357c6
SHA256704862a14c3b03e464cde36c6dfff69bd6f835638a57ddcda697ccae2eaf620e
SHA512fe3d666e611ab797fee9df860bf1719775d90e32d94b3b7d658c82e7e973790e360fb4294c76c169c4d26603b59347d9387bf0a16e143e69e9a34b7cfd6dfd27
-
Filesize
1.3MB
MD583a4b7e779273cdd46484d8729de3f60
SHA1379d4fbc70f9c60be123df0625c91d33cdf96b03
SHA2566db7af352ce10f844fb03b03a7caa443bde6bff14bdfc2fc2ee14b67b5700217
SHA5128c0488edd77155c12aaa6529c7eadcd2e9894edb3c50430208e7f8f9bc68c834831c8be14e3a97942d81db8a78347b02bfb99f04a076fdeebb3d943e2e590d71
-
Filesize
1.3MB
MD583a4b7e779273cdd46484d8729de3f60
SHA1379d4fbc70f9c60be123df0625c91d33cdf96b03
SHA2566db7af352ce10f844fb03b03a7caa443bde6bff14bdfc2fc2ee14b67b5700217
SHA5128c0488edd77155c12aaa6529c7eadcd2e9894edb3c50430208e7f8f9bc68c834831c8be14e3a97942d81db8a78347b02bfb99f04a076fdeebb3d943e2e590d71
-
Filesize
202B
MD51beba150f8280009f3bb3befaa7f155c
SHA138c5df1e9468322f7c61e9af8d86b62d12bbe0df
SHA256f0a8d9f0f615531032e899e7789d52a1531e1cbba7cef885bc0f34a13afc8b8a
SHA512e9561a88ec4d56c7f393f62d52cf797751ef256add76d63a86805d706472617aa84643d172db8fad49b54c14012b6c6ac1e0b45fb90a8e7671c0710afc665d74
-
Filesize
207B
MD5e267935396186cba2bb9679b3bfcf307
SHA1391f3b284b27096ce1fe72685ae202828caadc29
SHA256a85207337846608806a575d81590492d389945a0c0e8ce9d80e881257d536a61
SHA5126fd886ed3974bb066e7314cfe146e86f6c9244390265224850c71adb8ff255d734736ec07f862757f7bd4a600f1e943e590f730404cf2c93afc578a920915c8d
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca
-
Filesize
19B
MD56d2eb7ff01d1c70656ab0f3869fac94f
SHA104fe25b56e129532d8fabe557901e39f2977306b
SHA256e8541e5141dfc37099209e4fbdb3c527ba4c8bd81b10fa111a66d2d1bc81c2e2
SHA5121b9fa8b039acd2c84ecd2088470b02857e9b1810f3f55d258f0152513fb33dfdc6758e46fe6ed3e9cabad62015d537d6f7acbf06ee35089e75d3aaff4127e555
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca