Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2023, 01:44
Behavioral task
behavioral1
Sample
0x000b0000000122e5-60.exe
Resource
win7-20230220-en
General
-
Target
0x000b0000000122e5-60.exe
-
Size
3.1MB
-
MD5
8164a3361f7bb473d898b796ec12d468
-
SHA1
71d2afe83bedb25eec78188ddc1385361c3d632f
-
SHA256
c1ed20f252eaa28ae2e5fc1bc08c60d9f6beccecf5ad1cb2e8278271c7acda59
-
SHA512
e50bec34cc54dcf4fad041277b53f33c1cad64ea4f9352bd2bc144a4b41514b1c33e32245b3385f15fe14019c11c741f167e884de519ea4b2cb6a78dd598421c
-
SSDEEP
49152:avct62XlaSFNWPjljiFa2RoUYI2YRJ60bR3LoGdWTHHB72eh2NT:avg62XlaSFNWPjljiFXRoUYI2YRJ6+
Malware Config
Extracted
quasar
1.4.1
ninjagram
nethttp.sytes.net:4782
f04d3337-2e5e-4a42-bb35-8f2a600f118f
-
encryption_key
D3749570795A041A5B9B7F71D15CD539096DC336
-
install_name
boot.exe
-
log_directory
security
-
reconnect_delay
1000
-
startup_key
services
-
subdirectory
winrn
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral2/memory/3032-133-0x00000000002A0000-0x00000000005C4000-memory.dmp family_quasar behavioral2/files/0x0003000000000733-138.dat family_quasar behavioral2/files/0x0003000000000733-140.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1376 boot.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4768 schtasks.exe 3876 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3032 0x000b0000000122e5-60.exe Token: SeDebugPrivilege 1376 boot.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1376 boot.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3032 wrote to memory of 4768 3032 0x000b0000000122e5-60.exe 86 PID 3032 wrote to memory of 4768 3032 0x000b0000000122e5-60.exe 86 PID 3032 wrote to memory of 1376 3032 0x000b0000000122e5-60.exe 87 PID 3032 wrote to memory of 1376 3032 0x000b0000000122e5-60.exe 87 PID 1376 wrote to memory of 3876 1376 boot.exe 88 PID 1376 wrote to memory of 3876 1376 boot.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000b0000000122e5-60.exe"C:\Users\Admin\AppData\Local\Temp\0x000b0000000122e5-60.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "services" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\winrn\boot.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4768
-
-
C:\Users\Admin\AppData\Roaming\winrn\boot.exe"C:\Users\Admin\AppData\Roaming\winrn\boot.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "services" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\winrn\boot.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3876
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58164a3361f7bb473d898b796ec12d468
SHA171d2afe83bedb25eec78188ddc1385361c3d632f
SHA256c1ed20f252eaa28ae2e5fc1bc08c60d9f6beccecf5ad1cb2e8278271c7acda59
SHA512e50bec34cc54dcf4fad041277b53f33c1cad64ea4f9352bd2bc144a4b41514b1c33e32245b3385f15fe14019c11c741f167e884de519ea4b2cb6a78dd598421c
-
Filesize
3.1MB
MD58164a3361f7bb473d898b796ec12d468
SHA171d2afe83bedb25eec78188ddc1385361c3d632f
SHA256c1ed20f252eaa28ae2e5fc1bc08c60d9f6beccecf5ad1cb2e8278271c7acda59
SHA512e50bec34cc54dcf4fad041277b53f33c1cad64ea4f9352bd2bc144a4b41514b1c33e32245b3385f15fe14019c11c741f167e884de519ea4b2cb6a78dd598421c