Analysis
-
max time kernel
137s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2023 00:01
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe
Resource
win7-20221111-en
General
-
Target
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe
-
Size
16.5MB
-
MD5
b9874cdde692f485a1c609aeafd075c3
-
SHA1
8806ac9b20eaa78f89b5dfd1b78a3c7fb5cbffce
-
SHA256
66fdb47c24f569d7fae5707024809698812a40458216414827d3ea57cfb19dbb
-
SHA512
955e5e731e2d3fe9299fb90995fba95409d5b6086306960defbdc17f855175c63ccdb713f16b3e6ac3ee007f2317461d2e8693afefc56e7de494d879a3fd0aee
-
SSDEEP
98304:AQC5lSLCSHP8Z2HOR0mW1LCjqOMKmxE6G:LC5R0mh
Malware Config
Extracted
quasar
1.3.0.0
ET
orcus.dyndns.org:1605
lsdw.dyndns.org:1606
labeokunta.dynnds.org:1606
xpert.dyndns.biz:1605
qz.dyndns.org:1605
imageline.dyndns.org:1606
kontakt-update.selfip.net:1606
QSR_MUTEX_X8N0tEAk1p1Gbe9ioj
-
encryption_key
jVpAHlJqCIQYSDZsOYMx
-
install_name
Client.exe
-
log_directory
db.xlm
-
reconnect_delay
30000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
bitrat
1.38
hiv.dyndns.org:2222
-
communication_password
194dd40edef1873b88c241057bb55f1b
-
tor_process
tor
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4148-137-0x0000000001760000-0x00000000017BE000-memory.dmp family_quasar -
HiveRAT payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/3952-139-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-155-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-168-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-171-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-173-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-174-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-172-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-178-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-181-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-183-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat behavioral2/memory/3952-182-0x0000000001820000-0x00000000018AE000-memory.dmp family_hiverat -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 51 ip-api.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exedescription pid process target process PID 2952 set thread context of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 set thread context of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 set thread context of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3844 4668 WerFault.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exepid process 3952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exeHEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exedescription pid process Token: SeDebugPrivilege 3952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe Token: SeDebugPrivilege 4148 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exepid process 4148 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exedescription pid process target process PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4148 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 3952 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe PID 2952 wrote to memory of 4668 2952 HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe"2⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 1883⤵
- Program crash
PID:3844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4668 -ip 46681⤵PID:4608
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HEUR-Trojan.Win32.Generic-66fdb47c24f569d7fae.exe.log
Filesize323B
MD54af72c00db90b95c23cc32823c5b0453
SHA180f3754f05c09278987cba54e34b76f1ddbee5fd
SHA2565a99dc099cb5297a4d7714af94b14f170d8a0506899c82d6b8231a220f8dba5d
SHA51247aa798c4822bfd0b2a9110fcd1531494da99cf6e4aba5b59bfc36e21fcb1bdb5378189318bbb8519f0e8be732d90637f787ab63997d106bbcff31396155f9ef