Analysis
-
max time kernel
198s -
max time network
209s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-06-2023 20:35
Static task
static1
Behavioral task
behavioral1
Sample
pack.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
pack.exe
Resource
win10v2004-20230220-en
General
-
Target
pack.exe
-
Size
500.1MB
-
MD5
e893801ca83e49f84dca107d6e1162b4
-
SHA1
3122871288ac44693324194b793fc40347360bd4
-
SHA256
ca86561805b0e4184479159a552c05becbbad6f209b03df0819cbb0a47d75fe7
-
SHA512
94f5ca28aedbc2e32383e10ed354a7e8d135f234dae6f1b6f2e1e6f703e4323ae1f3d0f5cb23d57aa85ebe319e59709429837666a7e96234bcabe6b4b851a719
-
SSDEEP
384:ogPThofsksm2/HMLntRBSlwy/VpREaEhAqDjbY2QuzDf+m9xgJJt/V4568OwXpkD:tIXxOn6ZDn7d21448OKpkBC5ZF/i1
Malware Config
Extracted
purecrypter
http://95.214.24.37/SystemEnv/uploads/programme_Hdayjetq.jpg
Extracted
quasar
1.4.0.0
Office04
45.83.122.111:5557
p337SdjNpEb5aKmAPc
-
encryption_key
JzZjeR51DHpipyQ3lm91
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
-
reconnect_delay
3000
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Quasar payload 6 IoCs
resource yara_rule behavioral1/memory/1540-73-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1540-74-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1540-76-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1540-78-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1540-80-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/1540-81-0x0000000004960000-0x00000000049A0000-memory.dmp family_quasar -
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows\CurrentVersion\Run\Software = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsotf\\Software.exe\"" pack.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 1540 1984 pack.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 1240 powershell.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 660 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1984 pack.exe Token: SeDebugPrivilege 660 taskmgr.exe Token: SeDebugPrivilege 1240 powershell.exe Token: SeDebugPrivilege 1540 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe 660 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1540 InstallUtil.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1240 1984 pack.exe 29 PID 1984 wrote to memory of 1240 1984 pack.exe 29 PID 1984 wrote to memory of 1240 1984 pack.exe 29 PID 1984 wrote to memory of 1240 1984 pack.exe 29 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32 PID 1984 wrote to memory of 1540 1984 pack.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\pack.exe"C:\Users\Admin\AppData\Local\Temp\pack.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwADAA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:660