Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
475KB
-
MD5
b0b642d21e471002fe600e813ee8a5e4
-
SHA1
8d4dabde7bb206cd8c84dce88e65053de885da23
-
SHA256
4b42246e573c243f6d1cd35c21ef7d96f2ff9843904191557ed1ae52d531b6d5
-
SHA512
5f2dd93eae3bbf47092a76a7150606dc0bc4f1d836f1d82d6f170f4b1c21fc1d173a2ebfe2ae5057e9f0335bebec4988de8847782d8c14da47a06092ab5c4ac1
-
SSDEEP
12288:Ypi+uXadVjCQ0AybTTEZyI1yzL2FHO/mGXw2:YpDuXa/jCQYTTKy3LMuew
Malware Config
Extracted
quasar
1.3.0.0
EdrawMax
forex.4cloud.click:1981
wsbTZmpkXyxm8xAsQP
-
encryption_key
iBgx6lbqLn18oNE3C8cN
-
install_name
Client.exe
-
log_directory
16k
-
reconnect_delay
10000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3548-135-0x0000000000D30000-0x0000000000D8E000-memory.dmp family_quasar -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe" file.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run file.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 368 set thread context of 3548 368 file.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 1976 368 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3548 csc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 368 file.exe 3548 csc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 368 wrote to memory of 3548 368 file.exe 84 PID 368 wrote to memory of 3548 368 file.exe 84 PID 368 wrote to memory of 3548 368 file.exe 84 PID 368 wrote to memory of 3548 368 file.exe 84 PID 368 wrote to memory of 3548 368 file.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe-arguments2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 368 -s 6602⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 368 -ip 3681⤵PID:2000