Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 14:12

General

  • Target

    tmp.exe

  • Size

    6.7MB

  • MD5

    82792ba7124ecaa06893c3a6989bc70a

  • SHA1

    c7caa0f4f696e38f4adb20a3efa2334f8a18675c

  • SHA256

    7a6d23d9845bb08f5f50a89a909fc5dfc865cb77a9e44f370b56fd22d7a7f74f

  • SHA512

    907d19656886883c6c4fe10657bef9d7380be3b7c16a23d448924d33577df8f552e6c4feca379bbf14bfc4d5c390114e8ad84965bb03d97d0cad5a046371e9b0

  • SSDEEP

    196608:SdpVzj3zsdu95DsmQDzgnxUd9B0IETkQHXrjAYaUxHfl:eVzjjsdAsNzt9OIETkSXrj9txHfl

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

HEU_A

C2

hacker.548848.xyz:4000

Mutex

QSR_MUTEX_y7qRPJXwrKoCCGjifB

Attributes
  • encryption_key

    zOtqF7XIGfeSwK3tze2l

  • install_name

    IntelServiceUpdate.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Intel Service Update

  • subdirectory

    IntelServiceUpdate

Extracted

Family

quasar

Version

1.3.0.0

Botnet

HEU_T

C2

81.68.120.79:4000

Mutex

QSR_MUTEX_kWiUJRAFspPTbob5of

Attributes
  • encryption_key

    7GHKJ6ZgFY9nVhHS7b4U

  • install_name

    IntelService.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Intel Service

  • subdirectory

    IntelService

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 12 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Themida packer 20 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\installation.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\installation.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_A.exe
          HEU_A.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4972
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Intel Service Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_A.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:3000
          • C:\Windows\SysWOW64\IntelServiceUpdate\IntelServiceUpdate.exe
            "C:\Windows\SysWOW64\IntelServiceUpdate\IntelServiceUpdate.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2508
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "Intel Service Update" /sc ONLOGON /tr "C:\Windows\SysWOW64\IntelServiceUpdate\IntelServiceUpdate.exe" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:968
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_T.exe
          HEU_T.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Program Files directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3864
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Intel Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_T.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:692
          • C:\Program Files (x86)\IntelService\IntelService.exe
            "C:\Program Files (x86)\IntelService\IntelService.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Program Files directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2324
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "Intel Service" /sc ONLOGON /tr "C:\Program Files (x86)\IntelService\IntelService.exe" /rl HIGHEST /f
              6⤵
              • Creates scheduled task(s)
              PID:4936

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\IntelService\IntelService.exe
    Filesize

    3.2MB

    MD5

    40d62eddbff45d346db54f324aa84008

    SHA1

    0f40dcddb8ae4a1eedab47e7987eef133292ab91

    SHA256

    670e5d43cf31f19bda2ff0355456fbb657472402482e85202dc8a4f338d46858

    SHA512

    2274bde25d39170ad2e497ffd48d05397934588a413d60bbdde4fdda96226db5c7aa8b048312f1cab5758c4e4b5733ecc3001b9b777a9821d683a896495c627f

  • C:\Program Files (x86)\IntelService\IntelService.exe
    Filesize

    3.2MB

    MD5

    40d62eddbff45d346db54f324aa84008

    SHA1

    0f40dcddb8ae4a1eedab47e7987eef133292ab91

    SHA256

    670e5d43cf31f19bda2ff0355456fbb657472402482e85202dc8a4f338d46858

    SHA512

    2274bde25d39170ad2e497ffd48d05397934588a413d60bbdde4fdda96226db5c7aa8b048312f1cab5758c4e4b5733ecc3001b9b777a9821d683a896495c627f

  • C:\Program Files (x86)\IntelService\IntelService.exe
    Filesize

    3.2MB

    MD5

    40d62eddbff45d346db54f324aa84008

    SHA1

    0f40dcddb8ae4a1eedab47e7987eef133292ab91

    SHA256

    670e5d43cf31f19bda2ff0355456fbb657472402482e85202dc8a4f338d46858

    SHA512

    2274bde25d39170ad2e497ffd48d05397934588a413d60bbdde4fdda96226db5c7aa8b048312f1cab5758c4e4b5733ecc3001b9b777a9821d683a896495c627f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_A.exe
    Filesize

    3.2MB

    MD5

    e304134514f7d41aaf59ac7f33640ee6

    SHA1

    8bad53d74e0ce3b0fd45756ede792af25ce0e79a

    SHA256

    5aa4f078387db3d4909494600d8797355da8edd93047039119dd3fb71abf66e7

    SHA512

    7ad484d2cc195ff6850ebe564c1f7076b66e308b090d53b0ae24873f9986cc642ed648e416281077dbc5bb5d3a987102a5a958dbffeba85d058650f70612fcc9

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_A.exe
    Filesize

    3.2MB

    MD5

    e304134514f7d41aaf59ac7f33640ee6

    SHA1

    8bad53d74e0ce3b0fd45756ede792af25ce0e79a

    SHA256

    5aa4f078387db3d4909494600d8797355da8edd93047039119dd3fb71abf66e7

    SHA512

    7ad484d2cc195ff6850ebe564c1f7076b66e308b090d53b0ae24873f9986cc642ed648e416281077dbc5bb5d3a987102a5a958dbffeba85d058650f70612fcc9

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_T.exe
    Filesize

    3.2MB

    MD5

    40d62eddbff45d346db54f324aa84008

    SHA1

    0f40dcddb8ae4a1eedab47e7987eef133292ab91

    SHA256

    670e5d43cf31f19bda2ff0355456fbb657472402482e85202dc8a4f338d46858

    SHA512

    2274bde25d39170ad2e497ffd48d05397934588a413d60bbdde4fdda96226db5c7aa8b048312f1cab5758c4e4b5733ecc3001b9b777a9821d683a896495c627f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HEU_T.exe
    Filesize

    3.2MB

    MD5

    40d62eddbff45d346db54f324aa84008

    SHA1

    0f40dcddb8ae4a1eedab47e7987eef133292ab91

    SHA256

    670e5d43cf31f19bda2ff0355456fbb657472402482e85202dc8a4f338d46858

    SHA512

    2274bde25d39170ad2e497ffd48d05397934588a413d60bbdde4fdda96226db5c7aa8b048312f1cab5758c4e4b5733ecc3001b9b777a9821d683a896495c627f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\installation.bat
    Filesize

    38B

    MD5

    6c394f46eece6a9afe232492a2c8c2fa

    SHA1

    339a7e4dad0caa1c73af8c2425e64a4181ab9715

    SHA256

    f18ee7b9e8d4edca7b374a468ef076f5172f57bb4b26a3f5acfbe9d53e5fc201

    SHA512

    6a0ac3022ef4b98203badc24f2239c76012ba59704c333057dde6a29fd6db0137a9999c61c1ca086c5ff6404b2e3bbb12ddd56c17ea45871e976d44d640f3913

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\installation.vbs
    Filesize

    75B

    MD5

    a1bb86ecdb375e144840f6c94ddbd20c

    SHA1

    7d12aca5e928a4558e417cf69f958ca5b8acd39e

    SHA256

    8e814c00551b5b7e811528d270a962f65980c34dd39d2b964324448c6860a797

    SHA512

    f95693e623afb2e5b588cdf018a53ab58fbdd8cbd015946f289edb58679b7fb4df6a0437d372a52421c69d8bbc071859b69525fe31aa570a072abd4ccb70a9da

  • C:\Users\Admin\AppData\Roaming\Logs\03-25-2023
    Filesize

    224B

    MD5

    c7c5b49aa606d1ba213d66e3f864ad9f

    SHA1

    beba7cade8b4f91f84b2a265161cd550c6b5fce8

    SHA256

    c3ab4f43f4329cd91450e3b55e6acde474b1086912bb8d17011dd7bee66e6c0f

    SHA512

    560876d1e95918e3fd2029cb94d6c10ebf1fad8aa02019ff24d8795719dab89bac5f25e5f9ebfa583b10da3ddb7babe63520f3493c31fb3ddd69e43babc40d37

  • C:\Windows\SysWOW64\IntelServiceUpdate\IntelServiceUpdate.exe
    Filesize

    3.2MB

    MD5

    e304134514f7d41aaf59ac7f33640ee6

    SHA1

    8bad53d74e0ce3b0fd45756ede792af25ce0e79a

    SHA256

    5aa4f078387db3d4909494600d8797355da8edd93047039119dd3fb71abf66e7

    SHA512

    7ad484d2cc195ff6850ebe564c1f7076b66e308b090d53b0ae24873f9986cc642ed648e416281077dbc5bb5d3a987102a5a958dbffeba85d058650f70612fcc9

  • C:\Windows\SysWOW64\IntelServiceUpdate\IntelServiceUpdate.exe
    Filesize

    3.2MB

    MD5

    e304134514f7d41aaf59ac7f33640ee6

    SHA1

    8bad53d74e0ce3b0fd45756ede792af25ce0e79a

    SHA256

    5aa4f078387db3d4909494600d8797355da8edd93047039119dd3fb71abf66e7

    SHA512

    7ad484d2cc195ff6850ebe564c1f7076b66e308b090d53b0ae24873f9986cc642ed648e416281077dbc5bb5d3a987102a5a958dbffeba85d058650f70612fcc9

  • C:\Windows\SysWOW64\IntelServiceUpdate\IntelServiceUpdate.exe
    Filesize

    3.2MB

    MD5

    e304134514f7d41aaf59ac7f33640ee6

    SHA1

    8bad53d74e0ce3b0fd45756ede792af25ce0e79a

    SHA256

    5aa4f078387db3d4909494600d8797355da8edd93047039119dd3fb71abf66e7

    SHA512

    7ad484d2cc195ff6850ebe564c1f7076b66e308b090d53b0ae24873f9986cc642ed648e416281077dbc5bb5d3a987102a5a958dbffeba85d058650f70612fcc9

  • memory/2324-212-0x0000000000860000-0x00000000010EC000-memory.dmp
    Filesize

    8.5MB

  • memory/2324-200-0x0000000000860000-0x00000000010EC000-memory.dmp
    Filesize

    8.5MB

  • memory/2324-204-0x0000000000860000-0x00000000010EC000-memory.dmp
    Filesize

    8.5MB

  • memory/2324-205-0x0000000000860000-0x00000000010EC000-memory.dmp
    Filesize

    8.5MB

  • memory/2324-213-0x0000000005760000-0x0000000005770000-memory.dmp
    Filesize

    64KB

  • memory/2508-178-0x0000000003A50000-0x0000000003A60000-memory.dmp
    Filesize

    64KB

  • memory/2508-176-0x0000000000C30000-0x00000000014BA000-memory.dmp
    Filesize

    8.5MB

  • memory/2508-175-0x0000000000C30000-0x00000000014BA000-memory.dmp
    Filesize

    8.5MB

  • memory/2508-181-0x0000000007300000-0x000000000730A000-memory.dmp
    Filesize

    40KB

  • memory/2508-170-0x0000000000C30000-0x00000000014BA000-memory.dmp
    Filesize

    8.5MB

  • memory/2508-206-0x0000000003A50000-0x0000000003A60000-memory.dmp
    Filesize

    64KB

  • memory/2508-177-0x0000000000C30000-0x00000000014BA000-memory.dmp
    Filesize

    8.5MB

  • memory/3864-198-0x0000000000600000-0x0000000000E8C000-memory.dmp
    Filesize

    8.5MB

  • memory/3864-184-0x0000000000600000-0x0000000000E8C000-memory.dmp
    Filesize

    8.5MB

  • memory/3864-188-0x0000000000600000-0x0000000000E8C000-memory.dmp
    Filesize

    8.5MB

  • memory/3864-189-0x0000000000600000-0x0000000000E8C000-memory.dmp
    Filesize

    8.5MB

  • memory/3864-190-0x0000000005C90000-0x0000000005CA0000-memory.dmp
    Filesize

    64KB

  • memory/4972-161-0x0000000006AE0000-0x0000000006B1C000-memory.dmp
    Filesize

    240KB

  • memory/4972-160-0x00000000066C0000-0x00000000066D2000-memory.dmp
    Filesize

    72KB

  • memory/4972-159-0x0000000005AE0000-0x0000000005B46000-memory.dmp
    Filesize

    408KB

  • memory/4972-158-0x0000000005650000-0x0000000005660000-memory.dmp
    Filesize

    64KB

  • memory/4972-157-0x0000000005740000-0x00000000057D2000-memory.dmp
    Filesize

    584KB

  • memory/4972-169-0x0000000000940000-0x00000000011CA000-memory.dmp
    Filesize

    8.5MB

  • memory/4972-156-0x0000000005C50000-0x00000000061F4000-memory.dmp
    Filesize

    5.6MB

  • memory/4972-155-0x0000000000940000-0x00000000011CA000-memory.dmp
    Filesize

    8.5MB

  • memory/4972-154-0x0000000000940000-0x00000000011CA000-memory.dmp
    Filesize

    8.5MB

  • memory/4972-150-0x0000000000940000-0x00000000011CA000-memory.dmp
    Filesize

    8.5MB