Analysis
-
max time kernel
67s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
24-06-2023 20:38
Behavioral task
behavioral1
Sample
taskhosts-cleaned.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
taskhosts-cleaned.exe
Resource
win10v2004-20230621-en
General
-
Target
taskhosts-cleaned.exe
-
Size
385KB
-
MD5
6e5babe25aad66144dd2e15ab97bd38b
-
SHA1
61d589a0814a1ef9a0b1a06454f9761fe81ddbff
-
SHA256
fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147
-
SHA512
6547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896
-
SSDEEP
6144:F8jlR5z3XxhxrL8rK/A0j1/zTzTLNozbLRpw34urkR10efUK0:FMlHzHxhV/Aqipw3XQztfK
Malware Config
Extracted
quasar
1.4.0.0
Down
simplmizer.duckdns.org:1337
rhoc35VS3mkrMtkPb1
-
encryption_key
AN1JmoUwwzfA1Metx4Ze
-
install_name
taskhost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
EdgeBrowser
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1128-54-0x0000000000190000-0x00000000001F6000-memory.dmp family_quasar \Windows\SysWOW64\SubDir\taskhost.exe family_quasar C:\Windows\SysWOW64\SubDir\taskhost.exe family_quasar C:\Windows\SysWOW64\SubDir\taskhost.exe family_quasar behavioral1/memory/1376-63-0x0000000000290000-0x00000000002F6000-memory.dmp family_quasar C:\Windows\SysWOW64\SubDir\taskhost.exe family_quasar -
Executes dropped EXE 2 IoCs
Processes:
taskhost.exetaskhost.exepid process 1376 taskhost.exe 1104 taskhost.exe -
Loads dropped DLL 1 IoCs
Processes:
taskhosts-cleaned.exepid process 1128 taskhosts-cleaned.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
taskhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Windows\CurrentVersion\Run\EdgeBrowser = "\"C:\\Windows\\SysWOW64\\SubDir\\taskhost.exe\"" taskhost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
taskhost.exedescription ioc process File created C:\autorun.inf taskhost.exe -
Drops file in System32 directory 4 IoCs
Processes:
taskhosts-cleaned.exetaskhost.exedescription ioc process File created C:\Windows\SysWOW64\SubDir\taskhost.exe taskhosts-cleaned.exe File opened for modification C:\Windows\SysWOW64\SubDir\taskhost.exe taskhosts-cleaned.exe File opened for modification C:\Windows\SysWOW64\SubDir\taskhost.exe taskhost.exe File opened for modification C:\Windows\SysWOW64\SubDir taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1844 schtasks.exe 268 schtasks.exe 860 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskhosts-cleaned.exetaskhost.exedescription pid process Token: SeDebugPrivilege 1128 taskhosts-cleaned.exe Token: SeDebugPrivilege 1376 taskhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
taskhost.exepid process 1376 taskhost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
taskhosts-cleaned.exetaskhost.exetaskeng.exedescription pid process target process PID 1128 wrote to memory of 268 1128 taskhosts-cleaned.exe schtasks.exe PID 1128 wrote to memory of 268 1128 taskhosts-cleaned.exe schtasks.exe PID 1128 wrote to memory of 268 1128 taskhosts-cleaned.exe schtasks.exe PID 1128 wrote to memory of 268 1128 taskhosts-cleaned.exe schtasks.exe PID 1128 wrote to memory of 1376 1128 taskhosts-cleaned.exe taskhost.exe PID 1128 wrote to memory of 1376 1128 taskhosts-cleaned.exe taskhost.exe PID 1128 wrote to memory of 1376 1128 taskhosts-cleaned.exe taskhost.exe PID 1128 wrote to memory of 1376 1128 taskhosts-cleaned.exe taskhost.exe PID 1376 wrote to memory of 860 1376 taskhost.exe schtasks.exe PID 1376 wrote to memory of 860 1376 taskhost.exe schtasks.exe PID 1376 wrote to memory of 860 1376 taskhost.exe schtasks.exe PID 1376 wrote to memory of 860 1376 taskhost.exe schtasks.exe PID 1376 wrote to memory of 1844 1376 taskhost.exe schtasks.exe PID 1376 wrote to memory of 1844 1376 taskhost.exe schtasks.exe PID 1376 wrote to memory of 1844 1376 taskhost.exe schtasks.exe PID 1376 wrote to memory of 1844 1376 taskhost.exe schtasks.exe PID 788 wrote to memory of 1104 788 taskeng.exe taskhost.exe PID 788 wrote to memory of 1104 788 taskeng.exe taskhost.exe PID 788 wrote to memory of 1104 788 taskeng.exe taskhost.exe PID 788 wrote to memory of 1104 788 taskeng.exe taskhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskhosts-cleaned.exe"C:\Users\Admin\AppData\Local\Temp\taskhosts-cleaned.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "EdgeBrowser" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\taskhosts-cleaned.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:268
-
-
C:\Windows\SysWOW64\SubDir\taskhost.exe"C:\Windows\SysWOW64\SubDir\taskhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "EdgeBrowser" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\taskhost.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:860
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Windows\SysWOW64\SubDir\taskhost.exe" /sc MINUTE /MO 13⤵
- Creates scheduled task(s)
PID:1844
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {010FFB7F-67B9-4862-B878-646BEFCC2C67} S-1-5-21-3465915139-4244146034-2076118314-1000:MSOKFDFP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\SubDir\taskhost.exeC:\Windows\SysWOW64\SubDir\taskhost.exe2⤵
- Executes dropped EXE
PID:1104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD56e5babe25aad66144dd2e15ab97bd38b
SHA161d589a0814a1ef9a0b1a06454f9761fe81ddbff
SHA256fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147
SHA5126547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896
-
Filesize
385KB
MD56e5babe25aad66144dd2e15ab97bd38b
SHA161d589a0814a1ef9a0b1a06454f9761fe81ddbff
SHA256fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147
SHA5126547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896
-
Filesize
385KB
MD56e5babe25aad66144dd2e15ab97bd38b
SHA161d589a0814a1ef9a0b1a06454f9761fe81ddbff
SHA256fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147
SHA5126547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896
-
Filesize
385KB
MD56e5babe25aad66144dd2e15ab97bd38b
SHA161d589a0814a1ef9a0b1a06454f9761fe81ddbff
SHA256fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147
SHA5126547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896