Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-02-2023 00:01
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe
Resource
win7-20221111-en
General
-
Target
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe
-
Size
16.5MB
-
MD5
b9874cdde692f485a1c609aeafd075c3
-
SHA1
8806ac9b20eaa78f89b5dfd1b78a3c7fb5cbffce
-
SHA256
66fdb47c24f569d7fae5707024809698812a40458216414827d3ea57cfb19dbb
-
SHA512
955e5e731e2d3fe9299fb90995fba95409d5b6086306960defbdc17f855175c63ccdb713f16b3e6ac3ee007f2317461d2e8693afefc56e7de494d879a3fd0aee
-
SSDEEP
98304:AQC5lSLCSHP8Z2HOR0mW1LCjqOMKmxE6G:LC5R0mh
Malware Config
Extracted
quasar
1.3.0.0
ET
orcus.dyndns.org:1605
lsdw.dyndns.org:1606
labeokunta.dynnds.org:1606
xpert.dyndns.biz:1605
qz.dyndns.org:1605
imageline.dyndns.org:1606
kontakt-update.selfip.net:1606
QSR_MUTEX_X8N0tEAk1p1Gbe9ioj
-
encryption_key
jVpAHlJqCIQYSDZsOYMx
-
install_name
Client.exe
-
log_directory
db.xlm
-
reconnect_delay
30000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
bitrat
1.38
hiv.dyndns.org:2222
-
communication_password
194dd40edef1873b88c241057bb55f1b
-
tor_process
tor
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/784-59-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/784-60-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/784-61-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/784-62-0x000000000045831E-mapping.dmp family_quasar behavioral1/memory/784-64-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/784-66-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
HiveRAT payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1592-70-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-71-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-72-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-73-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-75-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-77-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-79-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-82-0x000000000044C8BE-mapping.dmp family_hiverat behavioral1/memory/1592-81-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-87-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-91-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-98-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-100-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-103-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-105-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-112-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-117-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-116-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat behavioral1/memory/1592-115-0x0000000000400000-0x000000000048E000-memory.dmp family_hiverat -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exepid process 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exedescription pid process target process PID 2016 set thread context of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 set thread context of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 set thread context of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exepid process 1592 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exeHEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exeHEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exedescription pid process Token: SeDebugPrivilege 1592 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe Token: SeDebugPrivilege 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe Token: SeShutdownPrivilege 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe Token: SeDebugPrivilege 784 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exeHEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exepid process 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe 964 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe 784 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exedescription pid process target process PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 784 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 1592 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2016 wrote to memory of 964 2016 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:964
-