Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30/01/2023, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
efb2d35f2a187b18fb7fe32eb68dd927.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
efb2d35f2a187b18fb7fe32eb68dd927.exe
Resource
win10v2004-20220812-en
General
-
Target
efb2d35f2a187b18fb7fe32eb68dd927.exe
-
Size
4.9MB
-
MD5
efb2d35f2a187b18fb7fe32eb68dd927
-
SHA1
12a73b569e16637e6e783b59d627f44ce0bf26d2
-
SHA256
10b1a61abfb2f91eea0fec8b52e5602c0f8630703a159593d23daf3c76da145f
-
SHA512
1f97643fd6990f19c17df867b0d86e3ef14837e09a500f2c4dff6652e81f3e965149e6b50b50f6dee257889c54b990248dd37b0920c1a630eea4cdca06260b34
-
SSDEEP
98304:p2cPK8sxc2Ml4nALiVRKC4x0UWMqs+QY/c0PjiqBa:QCK3e2Ml6AmVR80MbGjiqBa
Malware Config
Extracted
quasar
1.3.0.0
Adobe XD
stopman.ooguy.com:1980
craftIP.gize.com:1980
NtOcRpqrVzcLWKF9xK
-
encryption_key
PB6sv6yXkRlKJgQI1D4W
-
install_name
Client.exe
-
log_directory
mincraft
-
reconnect_delay
5000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
resource yara_rule behavioral1/memory/1612-82-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/1612-81-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/1612-83-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/1612-84-0x00000000004581CE-mapping.dmp family_quasar behavioral1/memory/1612-87-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/1612-89-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Executes dropped EXE 3 IoCs
pid Process 1220 AdobexD.exe 1764 Set-up.exe 1612 AdobexD.exe -
Loads dropped DLL 3 IoCs
pid Process 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 1220 AdobexD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Xsnkbqb = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mibjtqem\\Xsnkbqb.exe\"" AdobexD.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1220 set thread context of 1612 1220 AdobexD.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Set-up.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main Set-up.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Set-up.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Set-up.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Set-up.exe = "11001" Set-up.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Set-up.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Set-up.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Set-up.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Set-up.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Set-up.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Set-up.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Set-up.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 powershell.exe 280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1912 powershell.exe Token: SeDebugPrivilege 1220 AdobexD.exe Token: SeDebugPrivilege 280 powershell.exe Token: SeDebugPrivilege 1612 AdobexD.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1612 AdobexD.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1220 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 28 PID 1748 wrote to memory of 1220 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 28 PID 1748 wrote to memory of 1220 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 28 PID 1748 wrote to memory of 1220 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 28 PID 1748 wrote to memory of 1220 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 28 PID 1748 wrote to memory of 1220 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 28 PID 1748 wrote to memory of 1220 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 28 PID 1748 wrote to memory of 1764 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 29 PID 1748 wrote to memory of 1764 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 29 PID 1748 wrote to memory of 1764 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 29 PID 1748 wrote to memory of 1764 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 29 PID 1748 wrote to memory of 1764 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 29 PID 1748 wrote to memory of 1764 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 29 PID 1748 wrote to memory of 1764 1748 efb2d35f2a187b18fb7fe32eb68dd927.exe 29 PID 1220 wrote to memory of 1912 1220 AdobexD.exe 30 PID 1220 wrote to memory of 1912 1220 AdobexD.exe 30 PID 1220 wrote to memory of 1912 1220 AdobexD.exe 30 PID 1220 wrote to memory of 1912 1220 AdobexD.exe 30 PID 1220 wrote to memory of 280 1220 AdobexD.exe 32 PID 1220 wrote to memory of 280 1220 AdobexD.exe 32 PID 1220 wrote to memory of 280 1220 AdobexD.exe 32 PID 1220 wrote to memory of 280 1220 AdobexD.exe 32 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35 PID 1220 wrote to memory of 1612 1220 AdobexD.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\efb2d35f2a187b18fb7fe32eb68dd927.exe"C:\Users\Admin\AppData\Local\Temp\efb2d35f2a187b18fb7fe32eb68dd927.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\AdobexD.exeC:\Users\Admin\AppData\Local\Temp/AdobexD.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Users\Admin\AppData\Local\Temp\AdobexD.exeC:\Users\Admin\AppData\Local\Temp\AdobexD.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exeC:\Users\Admin\AppData\Local\Temp/Set-up.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies system certificate store
PID:1764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58c714e4006209f2c905366813be7f590
SHA11c9de3087ba737b38b02977b3d5f752772a37642
SHA256a6711368ae1c290a47312cb9f649045fbc609699043f921d5b060171ec5a35c2
SHA51241de564d28fbf094bc21b0dceef23e411e76254b51d18775757cb6712966f96238c4401a95f3501ef595255658a5360eb66801a0941dae354d9d972b67191f0a
-
Filesize
1.3MB
MD58c714e4006209f2c905366813be7f590
SHA11c9de3087ba737b38b02977b3d5f752772a37642
SHA256a6711368ae1c290a47312cb9f649045fbc609699043f921d5b060171ec5a35c2
SHA51241de564d28fbf094bc21b0dceef23e411e76254b51d18775757cb6712966f96238c4401a95f3501ef595255658a5360eb66801a0941dae354d9d972b67191f0a
-
Filesize
1.3MB
MD58c714e4006209f2c905366813be7f590
SHA11c9de3087ba737b38b02977b3d5f752772a37642
SHA256a6711368ae1c290a47312cb9f649045fbc609699043f921d5b060171ec5a35c2
SHA51241de564d28fbf094bc21b0dceef23e411e76254b51d18775757cb6712966f96238c4401a95f3501ef595255658a5360eb66801a0941dae354d9d972b67191f0a
-
Filesize
7.3MB
MD5bc0672307ff08325dc4348c89bdc8999
SHA145e37b595ac1b3ce6e3f6b6c12a9fa9c846addb4
SHA25624d2666c00ecd02350af0d70c8a9b71ed2bf0ce2553e61506fc1cbba0a9156b3
SHA512406c11bd4dbda325ee679f235988e8d1643d99de4dfd648d471857eee4892001011ffcc3fb9d1cda3161bce4fda70dcb2e5e3f1c5fd9e75091d49a6954864728
-
Filesize
7.3MB
MD5bc0672307ff08325dc4348c89bdc8999
SHA145e37b595ac1b3ce6e3f6b6c12a9fa9c846addb4
SHA25624d2666c00ecd02350af0d70c8a9b71ed2bf0ce2553e61506fc1cbba0a9156b3
SHA512406c11bd4dbda325ee679f235988e8d1643d99de4dfd648d471857eee4892001011ffcc3fb9d1cda3161bce4fda70dcb2e5e3f1c5fd9e75091d49a6954864728
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5139451d7733ecb60b4f3724d82cb1a85
SHA1487db39cd934da5d82c0ef40dcbca6840ef23f49
SHA25688b2fa6d16bdf4413241ae0fd908c477bc74d3abe948f7240b80ace676622061
SHA512bca4d9d530f563194adae5a0c2786f5e4bb860046ce98276382b2385522cc77df1bb377d3dc60bb509fcbdd0df7c33dfb21e4259df4a56c7dae43264e671b828
-
Filesize
1.3MB
MD58c714e4006209f2c905366813be7f590
SHA11c9de3087ba737b38b02977b3d5f752772a37642
SHA256a6711368ae1c290a47312cb9f649045fbc609699043f921d5b060171ec5a35c2
SHA51241de564d28fbf094bc21b0dceef23e411e76254b51d18775757cb6712966f96238c4401a95f3501ef595255658a5360eb66801a0941dae354d9d972b67191f0a
-
Filesize
1.3MB
MD58c714e4006209f2c905366813be7f590
SHA11c9de3087ba737b38b02977b3d5f752772a37642
SHA256a6711368ae1c290a47312cb9f649045fbc609699043f921d5b060171ec5a35c2
SHA51241de564d28fbf094bc21b0dceef23e411e76254b51d18775757cb6712966f96238c4401a95f3501ef595255658a5360eb66801a0941dae354d9d972b67191f0a
-
Filesize
7.3MB
MD5bc0672307ff08325dc4348c89bdc8999
SHA145e37b595ac1b3ce6e3f6b6c12a9fa9c846addb4
SHA25624d2666c00ecd02350af0d70c8a9b71ed2bf0ce2553e61506fc1cbba0a9156b3
SHA512406c11bd4dbda325ee679f235988e8d1643d99de4dfd648d471857eee4892001011ffcc3fb9d1cda3161bce4fda70dcb2e5e3f1c5fd9e75091d49a6954864728