Analysis
-
max time kernel
43s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:31
Static task
static1
Behavioral task
behavioral1
Sample
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe
Resource
win7-20220812-en
General
-
Target
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe
-
Size
1.0MB
-
MD5
d7ddd317f0382a2200832312449a20cd
-
SHA1
bd3710cff6322c6a372db549b637c32e383f05cc
-
SHA256
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e
-
SHA512
c3936a1943575b0bb9dfdf8fef0d9705fc08c275260ce8199b7ff13213b72173565e7c1a4dfd47bd4a5a592ce10749ff1dafe73ba0053c9bd8f7a8cee495407d
-
SSDEEP
24576:WcvkT1s+3Z3aGWqKg0Ogj1OLHd+JwbMFdt6ATCRcaahwKHGaTKBupdl:hvkTq+3Z3ZWGsSHd+J+MFTsRcXnHGmKm
Malware Config
Extracted
quasar
2.1.0.0
Office04
127.0.0.1:4782
rat94522.ddnsking.com:4000
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
WIwQFd2V7FhUXFH7QX71
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\file1.exe disable_win_def C:\Users\Admin\AppData\Local\Temp\file1.exe disable_win_def behavioral2/memory/4156-148-0x00000000001F0000-0x000000000027C000-memory.dmp disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def -
Processes:
file1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" file1.exe -
Quasar payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\file1.exe family_quasar C:\Users\Admin\AppData\Local\Temp\file1.exe family_quasar behavioral2/memory/4156-148-0x00000000001F0000-0x000000000027C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Executes dropped EXE 3 IoCs
Processes:
Crypted.exefile1.exeClient.exepid process 664 Crypted.exe 4156 file1.exe 4040 Client.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exeClient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Client.exe -
Processes:
file1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features file1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" file1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3196 4040 WerFault.exe Client.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2420 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1556 powershell.exe 1556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
file1.exepowershell.exeClient.exedescription pid process Token: SeDebugPrivilege 4156 file1.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 4040 Client.exe Token: SeDebugPrivilege 4040 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 4040 Client.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.execmd.exeCrypted.exefile1.exeClient.execmd.exedescription pid process target process PID 4972 wrote to memory of 2100 4972 d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe cmd.exe PID 4972 wrote to memory of 2100 4972 d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe cmd.exe PID 2100 wrote to memory of 2420 2100 cmd.exe timeout.exe PID 2100 wrote to memory of 2420 2100 cmd.exe timeout.exe PID 2100 wrote to memory of 664 2100 cmd.exe Crypted.exe PID 2100 wrote to memory of 664 2100 cmd.exe Crypted.exe PID 2100 wrote to memory of 664 2100 cmd.exe Crypted.exe PID 664 wrote to memory of 4156 664 Crypted.exe file1.exe PID 664 wrote to memory of 4156 664 Crypted.exe file1.exe PID 664 wrote to memory of 4156 664 Crypted.exe file1.exe PID 4156 wrote to memory of 4040 4156 file1.exe Client.exe PID 4156 wrote to memory of 4040 4156 file1.exe Client.exe PID 4156 wrote to memory of 4040 4156 file1.exe Client.exe PID 4156 wrote to memory of 1556 4156 file1.exe powershell.exe PID 4156 wrote to memory of 1556 4156 file1.exe powershell.exe PID 4156 wrote to memory of 1556 4156 file1.exe powershell.exe PID 4040 wrote to memory of 3108 4040 Client.exe cmd.exe PID 4040 wrote to memory of 3108 4040 Client.exe cmd.exe PID 4040 wrote to memory of 3108 4040 Client.exe cmd.exe PID 3108 wrote to memory of 3840 3108 cmd.exe chcp.com PID 3108 wrote to memory of 3840 3108 cmd.exe chcp.com PID 3108 wrote to memory of 3840 3108 cmd.exe chcp.com PID 3108 wrote to memory of 4564 3108 cmd.exe PING.EXE PID 3108 wrote to memory of 4564 3108 cmd.exe PING.EXE PID 3108 wrote to memory of 4564 3108 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe"C:\Users\Admin\AppData\Local\Temp\d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8264.tmp\8265.tmp\8266.bat C:\Users\Admin\AppData\Local\Temp\d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\Crypted.exeCrypted.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\file1.exeC:\Users\Admin\AppData\Local\Temp\\file1.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DjdyMgjbg41Z.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:3840
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:4564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 19686⤵
- Program crash
PID:3196
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4040 -ip 40401⤵PID:4488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5532fe973c7846cd45dd713eab9ccf5a2
SHA15c7ffe8a5f2ae88c6edc261e96dcdabbf9c357c6
SHA256704862a14c3b03e464cde36c6dfff69bd6f835638a57ddcda697ccae2eaf620e
SHA512fe3d666e611ab797fee9df860bf1719775d90e32d94b3b7d658c82e7e973790e360fb4294c76c169c4d26603b59347d9387bf0a16e143e69e9a34b7cfd6dfd27
-
Filesize
1.3MB
MD5bba9951ac1b09e948d1241d17ce26089
SHA19024729607388d44dff5c71892455d19a30dde49
SHA2561d6a15c938c9fd1e0444ccf1d51b3de52ce59413b09d0c9fec77fb9b955a661d
SHA51243c286f777832c3ce87d77393bc2a3f278cf9c788ccdae1b8794e583fd7360cad7bd1a720c3901af7ea953f8806cd6f59543850903719aea30cd711c8d55e492
-
Filesize
1.3MB
MD5bba9951ac1b09e948d1241d17ce26089
SHA19024729607388d44dff5c71892455d19a30dde49
SHA2561d6a15c938c9fd1e0444ccf1d51b3de52ce59413b09d0c9fec77fb9b955a661d
SHA51243c286f777832c3ce87d77393bc2a3f278cf9c788ccdae1b8794e583fd7360cad7bd1a720c3901af7ea953f8806cd6f59543850903719aea30cd711c8d55e492
-
Filesize
207B
MD59840d14d6005d5c59b4818f2949be16d
SHA1a1c46d798e47fe8df828904fda8a9448fec421a4
SHA256ce49018a180bcf96162d3f690ab18cc066fe70112f9b84358275b135388d0587
SHA512ba4c6d341e06041e75ddae5384176eba0321ee041c1c964bdc0ecbb122b08edce2b0c5b3933f6056428f96f9c51e3aef44ba95493fa06a6ac94394240781c3bc
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca
-
Filesize
19B
MD50aced8c91d43523ad097145bfbe021a1
SHA19d391623826590b6fa22b4257fcb5d760009faec
SHA25603f309831b047eaace14ccb7d2ba00bf6279a2dbb0794f81f8d80c9df48ccbeb
SHA512e06d01a8e19a1ac6e9e92967329ec8722af0d9f38d04585b87da905a473fe785aa4bb509416b39afa63b3d4ef35148f05a07dd5fb382b01e4a586e1a581a46a1
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca
-
Filesize
534KB
MD5c3e9d09f741548288dae2d21cdd8d05a
SHA179245cec78e2793ba75cbadc88b30aebd13cf9d9
SHA2560fe098471d1c513f29fbcd3a7c10deb467bb62aa35da59cca1b88b16f6c88db5
SHA512cea14fa657f3779008fde0acdcf94880b26662a49009e2ac5fcdd85a6fc36d736df3d5e67af6ae6b20a76c6734dbc3a849433b002be9c803a62abd4d2ce3dbca