Analysis

  • max time kernel
    64s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 17:30

General

  • Target

    329b98802dad1219886d6912d0d5303f7d8012ff2c27fe0bd917b5b069865903.exe

  • Size

    1.0MB

  • MD5

    fc6cd521af42d5423b8ce0e53ae67703

  • SHA1

    49a14b2ba77028b1dfb8167bdafdd2908c40f861

  • SHA256

    329b98802dad1219886d6912d0d5303f7d8012ff2c27fe0bd917b5b069865903

  • SHA512

    0de482d1f6ae53197da70045f84f2071e3a17b9cc90a4e3b7c68c1210590fe5f6eb4ec86d1c233e4c0c4662fb639c861bed0c869509ddf9cf53b9b3b4b841bab

  • SSDEEP

    24576:ucvkTM6qPOgKbORmiNbbAb21NUJ2k+U1kYC80Oy2dj08:pvkT9Q+4miNG217k9Z5x

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

127.0.0.1:4782

rat94522.ddnsking.com:4000

Mutex

VNM_MUTEX_c2q7y2ayYutZ2XaYe7

Attributes
  • encryption_key

    WIwQFd2V7FhUXFH7QX71

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 18 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar payload 18 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 5 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\329b98802dad1219886d6912d0d5303f7d8012ff2c27fe0bd917b5b069865903.exe
    "C:\Users\Admin\AppData\Local\Temp\329b98802dad1219886d6912d0d5303f7d8012ff2c27fe0bd917b5b069865903.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FB50.tmp\FB51.tmp\FB52.bat C:\Users\Admin\AppData\Local\Temp\329b98802dad1219886d6912d0d5303f7d8012ff2c27fe0bd917b5b069865903.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\system32\timeout.exe
        timeout 2
        3⤵
        • Quasar RAT
        • Delays execution with timeout.exe
        PID:608
      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
        Crypted.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Users\Admin\AppData\Local\Temp\file1.exe
          C:\Users\Admin\AppData\Local\Temp\\file1.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1384
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\fdRsCNLqGLZb.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1708
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                7⤵
                  PID:1060
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  7⤵
                  • Runs ping.exe
                  PID:2000
                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                  7⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1180
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 1496
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2028
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" Get-MpPreference -verbose
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1724
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:556
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
                6⤵
                • Deletes itself
                PID:364
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\SxwO3flfiUiV.bat" "
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:544
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                6⤵
                  PID:984
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • Runs ping.exe
                  PID:824
                • C:\Users\Admin\AppData\Local\Temp\file1.exe
                  "C:\Users\Admin\AppData\Local\Temp\file1.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1100

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe

        Filesize

        1.3MB

        MD5

        3f68906bde81e068affd2fde48438c09

        SHA1

        5a885c286a8fab03b7e473dff4b79c4da94bd6f3

        SHA256

        b476a1cc9ca8b3191d5058ec792ec598159bef8d344d3d3e16361ef8cf20da50

        SHA512

        73cf19f408f7a32948f0254fa3a4ef917a23a50c35a4b729181d76bbf4d2465b4d514ae52b30422e26d9804620847e17de50bdb2f541d36c0d6e612cf535f130

      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe

        Filesize

        1.3MB

        MD5

        3f68906bde81e068affd2fde48438c09

        SHA1

        5a885c286a8fab03b7e473dff4b79c4da94bd6f3

        SHA256

        b476a1cc9ca8b3191d5058ec792ec598159bef8d344d3d3e16361ef8cf20da50

        SHA512

        73cf19f408f7a32948f0254fa3a4ef917a23a50c35a4b729181d76bbf4d2465b4d514ae52b30422e26d9804620847e17de50bdb2f541d36c0d6e612cf535f130

      • C:\Users\Admin\AppData\Local\Temp\FB50.tmp\FB51.tmp\FB52.bat

        Filesize

        72B

        MD5

        532fe973c7846cd45dd713eab9ccf5a2

        SHA1

        5c7ffe8a5f2ae88c6edc261e96dcdabbf9c357c6

        SHA256

        704862a14c3b03e464cde36c6dfff69bd6f835638a57ddcda697ccae2eaf620e

        SHA512

        fe3d666e611ab797fee9df860bf1719775d90e32d94b3b7d658c82e7e973790e360fb4294c76c169c4d26603b59347d9387bf0a16e143e69e9a34b7cfd6dfd27

      • C:\Users\Admin\AppData\Local\Temp\SxwO3flfiUiV.bat

        Filesize

        202B

        MD5

        fab8f86965f65463005bc604eb992cd3

        SHA1

        786be2ac09159d66145b88571cc1bd8eccc39bdd

        SHA256

        053525754227e1bd5ea8bedf9f6bce7eb88c166f138d1012f65a149e65996886

        SHA512

        40ef4acca9e51a7b89db255a59a79222b526be092d306ceddc18db4179acad677ff0cc4611026ab6030b38e62d043ede79371da8dda6753d34fe427ef546e3ca

      • C:\Users\Admin\AppData\Local\Temp\fdRsCNLqGLZb.bat

        Filesize

        207B

        MD5

        5095caa4a20d412dcd27db563d6c2484

        SHA1

        397d713eafb0168d28ee30680fdaadc0aa11c570

        SHA256

        9ef0e4fd0f3bec8097506402dd32dad932f0d22896069e3535f943862795bc62

        SHA512

        4684332dd35842186bccb9a8372e9e3c9a6c816b1e63fd9b6ef68fc14501a24095a457fb03afe06b0a147eb3469c7600e056f689d15c4860e279c5953c4d9198

      • C:\Users\Admin\AppData\Local\Temp\file1.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Local\Temp\file1.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Local\Temp\file1.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Local\Temp\version.html

        Filesize

        7B

        MD5

        c3e5db9ee69e08ea7c1d3606e792f395

        SHA1

        fef456f1a4a7bfdbb8c8fc5d4dbe784953640889

        SHA256

        2fb033ae057446c19dbab9b9f9b54351f7d0f28f975d22560124eae402ac21f8

        SHA512

        ede02f77273374298455f437455cbb15f1b71cd15a0345647693bb5cf0fe46b670fc862105e91362a755d51243205011e5463cdd95cddec6996d9c8b92b5337c

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Local\Temp\file1.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Local\Temp\file1.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • \Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        534KB

        MD5

        c3e9d09f741548288dae2d21cdd8d05a

        SHA1

        79245cec78e2793ba75cbadc88b30aebd13cf9d9

        SHA256

        0fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5

        SHA512

        cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca

      • memory/364-81-0x0000000000000000-mapping.dmp

      • memory/544-82-0x0000000000000000-mapping.dmp

      • memory/556-80-0x0000000000000000-mapping.dmp

      • memory/608-57-0x0000000000000000-mapping.dmp

      • memory/752-54-0x0000000075D01000-0x0000000075D03000-memory.dmp

        Filesize

        8KB

      • memory/824-85-0x0000000000000000-mapping.dmp

      • memory/984-84-0x0000000000000000-mapping.dmp

      • memory/1060-89-0x0000000000000000-mapping.dmp

      • memory/1072-55-0x0000000000000000-mapping.dmp

      • memory/1100-99-0x0000000001360000-0x00000000013EC000-memory.dmp

        Filesize

        560KB

      • memory/1100-97-0x0000000000000000-mapping.dmp

      • memory/1180-102-0x0000000000000000-mapping.dmp

      • memory/1384-71-0x0000000000000000-mapping.dmp

      • memory/1384-74-0x0000000000850000-0x00000000008DC000-memory.dmp

        Filesize

        560KB

      • memory/1708-86-0x0000000000000000-mapping.dmp

      • memory/1724-75-0x0000000000000000-mapping.dmp

      • memory/1724-79-0x000000006F210000-0x000000006F7BB000-memory.dmp

        Filesize

        5.7MB

      • memory/1724-78-0x000000006F210000-0x000000006F7BB000-memory.dmp

        Filesize

        5.7MB

      • memory/1984-68-0x0000000000980000-0x0000000000A0C000-memory.dmp

        Filesize

        560KB

      • memory/1984-65-0x0000000000000000-mapping.dmp

      • memory/1988-61-0x0000000000F80000-0x0000000000FDE000-memory.dmp

        Filesize

        376KB

      • memory/1988-59-0x0000000000000000-mapping.dmp

      • memory/2000-94-0x0000000000000000-mapping.dmp

      • memory/2028-88-0x0000000000000000-mapping.dmp