Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
Uplay_R6_Cap/Checker.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Uplay_R6_Cap/Uplay.exe
Resource
win10v2004-20230220-en
General
-
Target
Uplay_R6_Cap/Checker.exe
-
Size
3.1MB
-
MD5
547647b2a11212e16758e86e596c4e38
-
SHA1
22562c0a77948e12fb7a9d55b4bbf9a7653cb0bb
-
SHA256
aa842236e758058ef3ad704681ed6e8c391caf1fa5b64f47af05bb35e04377ca
-
SHA512
b3794971c334c2c456816dece4c8d871d6da16a23de6c52f0877b41b49a3526070377c8e55c7b93f98387087f7a743d5c89de99233ca37ce717d748d1f7a1287
-
SSDEEP
49152:hqynoUPX6KAiY5/UmaFJYYKoONHm5LOx1ndwlpN+w5nIdNawgmy6ISXstG5Auh0r:svKAiY9aFJPkyLOxdmljInpgXyXGGul
Malware Config
Extracted
quasar
1.4.1
ShanX
pubgm.ddns.net:3463
fe19d956-967f-4776-a516-d40c85ea9e9a
-
encryption_key
C00A9243E77E6BA0615E28214F4657063CECD5D6
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4476-138-0x00000000009A0000-0x0000000000CC4000-memory.dmp family_quasar -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Checker.exedescription pid process target process PID 1512 set thread context of 4476 1512 Checker.exe vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 4476 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 4476 vbc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Checker.execmd.exedescription pid process target process PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 4476 1512 Checker.exe vbc.exe PID 1512 wrote to memory of 1860 1512 Checker.exe cmd.exe PID 1512 wrote to memory of 1860 1512 Checker.exe cmd.exe PID 1512 wrote to memory of 1860 1512 Checker.exe cmd.exe PID 1512 wrote to memory of 4796 1512 Checker.exe cmd.exe PID 1512 wrote to memory of 4796 1512 Checker.exe cmd.exe PID 1512 wrote to memory of 4796 1512 Checker.exe cmd.exe PID 4796 wrote to memory of 4376 4796 cmd.exe schtasks.exe PID 4796 wrote to memory of 4376 4796 cmd.exe schtasks.exe PID 4796 wrote to memory of 4376 4796 cmd.exe schtasks.exe PID 1512 wrote to memory of 632 1512 Checker.exe cmd.exe PID 1512 wrote to memory of 632 1512 Checker.exe cmd.exe PID 1512 wrote to memory of 632 1512 Checker.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uplay_R6_Cap\Checker.exe"C:\Users\Admin\AppData\Local\Temp\Uplay_R6_Cap\Checker.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\adobe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\adobe\adobe.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\adobe\adobe.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Uplay_R6_Cap\Checker.exe" "C:\Users\Admin\AppData\Local\Temp\adobe\adobe.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1512-133-0x0000000000B00000-0x0000000000E28000-memory.dmpFilesize
3.2MB
-
memory/1512-134-0x0000000005D30000-0x00000000062D4000-memory.dmpFilesize
5.6MB
-
memory/1512-135-0x0000000005770000-0x0000000005780000-memory.dmpFilesize
64KB
-
memory/1512-137-0x0000000007710000-0x00000000077A2000-memory.dmpFilesize
584KB
-
memory/4476-138-0x00000000009A0000-0x0000000000CC4000-memory.dmpFilesize
3.1MB
-
memory/4476-139-0x00000000051F0000-0x00000000051FA000-memory.dmpFilesize
40KB
-
memory/4476-140-0x00000000051C0000-0x00000000051D0000-memory.dmpFilesize
64KB
-
memory/4476-141-0x0000000006470000-0x0000000006A88000-memory.dmpFilesize
6.1MB
-
memory/4476-142-0x0000000005FA0000-0x0000000005FF0000-memory.dmpFilesize
320KB
-
memory/4476-143-0x0000000006210000-0x00000000062C2000-memory.dmpFilesize
712KB
-
memory/4476-147-0x00000000051C0000-0x00000000051D0000-memory.dmpFilesize
64KB