Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2023 14:50
Behavioral task
behavioral1
Sample
xPP4QxLkmgBB.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
xPP4QxLkmgBB.exe
Resource
win10v2004-20230220-en
General
-
Target
xPP4QxLkmgBB.exe
-
Size
1.0MB
-
MD5
304034ca275b3be98d1b92d28a7ed71a
-
SHA1
73cb868ddb133f04db518af41420582b85f99c97
-
SHA256
b7edc8206134842f1452de2fcc1604b40a078d75a2a56391fc5698aef9fc9240
-
SHA512
3e76ce61d0ac85ac33ebc45f15f504cdf4e4c758b3a5c80668c2e1b55cc290b138abee12851b28d02a9fa38f4b1807f6a401958bc194330d9a3f517e0960f03b
-
SSDEEP
24576:Raynkc1ZzBvtrZHFjMKY2aq77woIu7el6pRZRcL9:wynkc1ZzBvtrZHFjMKY2Rw3u7el6pR3
Malware Config
Extracted
quasar
2.7.0.0
Venom Client
crazydns.linkpc.net:26134
JlYM51eW4iZoFyLa2X
-
encryption_key
dRPxHr2NcM6jte8WN3KY
-
install_name
Venom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4916-133-0x00000000001C0000-0x00000000002D0000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
xPP4QxLkmgBB.exedescription pid process Token: SeDebugPrivilege 4916 xPP4QxLkmgBB.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4916-133-0x00000000001C0000-0x00000000002D0000-memory.dmpFilesize
1.1MB
-
memory/4916-134-0x0000000005320000-0x00000000058C4000-memory.dmpFilesize
5.6MB
-
memory/4916-135-0x0000000004D70000-0x0000000004E02000-memory.dmpFilesize
584KB
-
memory/4916-136-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB
-
memory/4916-137-0x0000000004C90000-0x0000000004CF6000-memory.dmpFilesize
408KB
-
memory/4916-138-0x00000000052F0000-0x0000000005302000-memory.dmpFilesize
72KB
-
memory/4916-139-0x0000000005EF0000-0x0000000005F2C000-memory.dmpFilesize
240KB
-
memory/4916-140-0x0000000006630000-0x000000000663A000-memory.dmpFilesize
40KB
-
memory/4916-141-0x0000000004C80000-0x0000000004C90000-memory.dmpFilesize
64KB