Analysis

  • max time kernel
    98s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2023 13:32

General

  • Target

    AccountRipper.exe

  • Size

    3.2MB

  • MD5

    06cbc080be08dda4bfd5068eeb59c6b0

  • SHA1

    1bbda9c31d945429b53dd4784f0bf835e5c551df

  • SHA256

    e9b48dffda40e2f2f6172e36d5646e6779a4bb4a0692083f8db1408206b6636e

  • SHA512

    ee64e688544aaf5d5a444f5f0f3acabc6ac703ac49f4bf7858ae144b8f3e63348186e226ad7e8bb18b07fc0401f841e092588f2ef5602bb8d5d29179591f50a8

  • SSDEEP

    49152:6vAt62XlaSFNWPjljiFa2RoUYI0X0+bRSLoGdtTHHB72eh2NT:6vs62XlaSFNWPjljiFXRoUYI0X0T

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Proton

C2

212.154.101.132:3000

Mutex

1b3adac2-334a-4914-b42a-429f32ec011f

Attributes
  • encryption_key

    8738101E98DC472C5F4C9FE5E109DEF1CA883172

  • install_name

    Method.exe

  • log_directory

    Logs

  • reconnect_delay

    2

  • startup_key

    Java

  • subdirectory

    Proton

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\AccountRipper.exe
    "C:\Users\Admin\AppData\Local\Temp\AccountRipper.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Java" /sc ONLOGON /tr "C:\Windows\system32\Proton\Method.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1596
    • C:\Windows\system32\Proton\Method.exe
      "C:\Windows\system32\Proton\Method.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Java" /sc ONLOGON /tr "C:\Windows\system32\Proton\Method.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:3584
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4164

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\Proton\Method.exe
    Filesize

    3.2MB

    MD5

    06cbc080be08dda4bfd5068eeb59c6b0

    SHA1

    1bbda9c31d945429b53dd4784f0bf835e5c551df

    SHA256

    e9b48dffda40e2f2f6172e36d5646e6779a4bb4a0692083f8db1408206b6636e

    SHA512

    ee64e688544aaf5d5a444f5f0f3acabc6ac703ac49f4bf7858ae144b8f3e63348186e226ad7e8bb18b07fc0401f841e092588f2ef5602bb8d5d29179591f50a8

  • C:\Windows\system32\Proton\Method.exe
    Filesize

    3.2MB

    MD5

    06cbc080be08dda4bfd5068eeb59c6b0

    SHA1

    1bbda9c31d945429b53dd4784f0bf835e5c551df

    SHA256

    e9b48dffda40e2f2f6172e36d5646e6779a4bb4a0692083f8db1408206b6636e

    SHA512

    ee64e688544aaf5d5a444f5f0f3acabc6ac703ac49f4bf7858ae144b8f3e63348186e226ad7e8bb18b07fc0401f841e092588f2ef5602bb8d5d29179591f50a8

  • memory/4008-145-0x000000001BAE0000-0x000000001BAF0000-memory.dmp
    Filesize

    64KB

  • memory/4008-159-0x000000001D0E0000-0x000000001D608000-memory.dmp
    Filesize

    5.2MB

  • memory/4008-140-0x000000001BAE0000-0x000000001BAF0000-memory.dmp
    Filesize

    64KB

  • memory/4008-141-0x0000000002DD0000-0x0000000002E20000-memory.dmp
    Filesize

    320KB

  • memory/4008-142-0x000000001C1B0000-0x000000001C262000-memory.dmp
    Filesize

    712KB

  • memory/4008-143-0x000000001B950000-0x000000001B962000-memory.dmp
    Filesize

    72KB

  • memory/4008-144-0x000000001C0F0000-0x000000001C12C000-memory.dmp
    Filesize

    240KB

  • memory/4164-146-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-147-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-148-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-152-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-154-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-153-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-155-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-156-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-158-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4164-157-0x000001B9AA890000-0x000001B9AA891000-memory.dmp
    Filesize

    4KB

  • memory/4968-133-0x00000000001E0000-0x0000000000520000-memory.dmp
    Filesize

    3.2MB

  • memory/4968-134-0x0000000002820000-0x0000000002830000-memory.dmp
    Filesize

    64KB