Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
Recrypted.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Recrypted.exe
Resource
win10v2004-20230621-en
General
-
Target
Recrypted.exe
-
Size
2.9MB
-
MD5
68a23c2fc62bddad0a2c6cf36003577b
-
SHA1
67a19bf734520933adfa28afc017c3af1d6a3d5b
-
SHA256
7a6db8aecc2376ec7dfc50085757841523fb69135e364b70c7319bf7a39209d7
-
SHA512
0386671ee83c0825f80a0c95b4e21eb23054878546aff5d8ef63a3bcc6a32c53a61397009aee8e8c5fc171b1ed0e9b69a31111eb1b860e1ff67264fcac806cef
-
SSDEEP
24576:plubLwtFDS7FYNYD7264xnRhc/LSXxH227hqRCeFcOziFJLUfdKTgWA22222222:gZ7h4xnRhcGXxHxOqdq1pup
Malware Config
Extracted
quasar
1.3.0.0
SUCCESS
41.185.97.216:4782
MUTEX_QAxMFzrXWG2cbIHPGK
-
encryption_key
4DwUV8AnxPgmXSMeThKb
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
cmd
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/1760-163-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\Control Panel\International\Geo\Nation Recrypted.exe -
Executes dropped EXE 3 IoCs
pid Process 3328 Client.exe 3040 Client.exe 1952 Client.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Omjvs = "\"C:\\Users\\Admin\\AppData\\Roaming\\Saizfrsak\\Omjvs.exe\"" Client.exe Set value (str) \REGISTRY\USER\S-1-5-21-4025927695-1301755775-2607443251-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Omjvs = "\"C:\\Users\\Admin\\AppData\\Roaming\\Saizfrsak\\Omjvs.exe\"" Recrypted.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4284 set thread context of 1760 4284 Recrypted.exe 96 PID 3328 set thread context of 1952 3328 Client.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 232 schtasks.exe 4680 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4272 powershell.exe 4272 powershell.exe 4284 Recrypted.exe 4284 Recrypted.exe 4284 Recrypted.exe 4284 Recrypted.exe 3108 powershell.exe 3108 powershell.exe 3328 Client.exe 3328 Client.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4272 powershell.exe Token: SeDebugPrivilege 4284 Recrypted.exe Token: SeDebugPrivilege 1760 Recrypted.exe Token: SeDebugPrivilege 3108 powershell.exe Token: SeDebugPrivilege 3328 Client.exe Token: SeDebugPrivilege 1952 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 Client.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4284 wrote to memory of 4272 4284 Recrypted.exe 84 PID 4284 wrote to memory of 4272 4284 Recrypted.exe 84 PID 4284 wrote to memory of 4272 4284 Recrypted.exe 84 PID 4284 wrote to memory of 380 4284 Recrypted.exe 94 PID 4284 wrote to memory of 380 4284 Recrypted.exe 94 PID 4284 wrote to memory of 380 4284 Recrypted.exe 94 PID 4284 wrote to memory of 2200 4284 Recrypted.exe 95 PID 4284 wrote to memory of 2200 4284 Recrypted.exe 95 PID 4284 wrote to memory of 2200 4284 Recrypted.exe 95 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 4284 wrote to memory of 1760 4284 Recrypted.exe 96 PID 1760 wrote to memory of 232 1760 Recrypted.exe 99 PID 1760 wrote to memory of 232 1760 Recrypted.exe 99 PID 1760 wrote to memory of 232 1760 Recrypted.exe 99 PID 1760 wrote to memory of 3328 1760 Recrypted.exe 101 PID 1760 wrote to memory of 3328 1760 Recrypted.exe 101 PID 1760 wrote to memory of 3328 1760 Recrypted.exe 101 PID 3328 wrote to memory of 3108 3328 Client.exe 102 PID 3328 wrote to memory of 3108 3328 Client.exe 102 PID 3328 wrote to memory of 3108 3328 Client.exe 102 PID 3328 wrote to memory of 3040 3328 Client.exe 106 PID 3328 wrote to memory of 3040 3328 Client.exe 106 PID 3328 wrote to memory of 3040 3328 Client.exe 106 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 3328 wrote to memory of 1952 3328 Client.exe 107 PID 1952 wrote to memory of 4680 1952 Client.exe 108 PID 1952 wrote to memory of 4680 1952 Client.exe 108 PID 1952 wrote to memory of 4680 1952 Client.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Recrypted.exe"C:\Users\Admin\AppData\Local\Temp\Recrypted.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\Recrypted.exeC:\Users\Admin\AppData\Local\Temp\Recrypted.exe2⤵PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\Recrypted.exeC:\Users\Admin\AppData\Local\Temp\Recrypted.exe2⤵PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\Recrypted.exeC:\Users\Admin\AppData\Local\Temp\Recrypted.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "cmd" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Recrypted.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:232
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeC:\Users\Admin\AppData\Roaming\SubDir\Client.exe4⤵
- Executes dropped EXE
PID:3040
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeC:\Users\Admin\AppData\Roaming\SubDir\Client.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "cmd" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:4680
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57e88081fcf716d85992bb3af3d9b6454
SHA12153780fbc71061b0102a7a7b665349e1013e250
SHA2565ffb4a3ea94a6a53c4f88e2191c6fec5fd8a7336e367aa113fe8c12631e0c4d2
SHA512ec606e14367ae221c04f213a61a6f797034495121198e4788e3afa4aa8db67bf59c5c5210a56afae5557158e8923b013b371b84c7d64303618c5b4c57a2224f7
-
Filesize
1KB
MD57e88081fcf716d85992bb3af3d9b6454
SHA12153780fbc71061b0102a7a7b665349e1013e250
SHA2565ffb4a3ea94a6a53c4f88e2191c6fec5fd8a7336e367aa113fe8c12631e0c4d2
SHA512ec606e14367ae221c04f213a61a6f797034495121198e4788e3afa4aa8db67bf59c5c5210a56afae5557158e8923b013b371b84c7d64303618c5b4c57a2224f7
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD52d0d737dc03e2a2b26219569fb49c760
SHA1bd7ef512d50cfb6fb4beba79bf8a8a0f5d4f3d79
SHA2563541b3b83fbb7865106d67396081f368a1e7862a03b566d5ba0d83f10fbcefcd
SHA5120f9899813e9d4f43f8a00128e25156c6167a3449c3273a90bfad230aabb1842c7bfca6466f40f67bf673e6e8e82bfb678cf5dfe5090535f153154720fc863858
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD568a23c2fc62bddad0a2c6cf36003577b
SHA167a19bf734520933adfa28afc017c3af1d6a3d5b
SHA2567a6db8aecc2376ec7dfc50085757841523fb69135e364b70c7319bf7a39209d7
SHA5120386671ee83c0825f80a0c95b4e21eb23054878546aff5d8ef63a3bcc6a32c53a61397009aee8e8c5fc171b1ed0e9b69a31111eb1b860e1ff67264fcac806cef
-
Filesize
2.9MB
MD568a23c2fc62bddad0a2c6cf36003577b
SHA167a19bf734520933adfa28afc017c3af1d6a3d5b
SHA2567a6db8aecc2376ec7dfc50085757841523fb69135e364b70c7319bf7a39209d7
SHA5120386671ee83c0825f80a0c95b4e21eb23054878546aff5d8ef63a3bcc6a32c53a61397009aee8e8c5fc171b1ed0e9b69a31111eb1b860e1ff67264fcac806cef
-
Filesize
2.9MB
MD568a23c2fc62bddad0a2c6cf36003577b
SHA167a19bf734520933adfa28afc017c3af1d6a3d5b
SHA2567a6db8aecc2376ec7dfc50085757841523fb69135e364b70c7319bf7a39209d7
SHA5120386671ee83c0825f80a0c95b4e21eb23054878546aff5d8ef63a3bcc6a32c53a61397009aee8e8c5fc171b1ed0e9b69a31111eb1b860e1ff67264fcac806cef
-
Filesize
2.9MB
MD568a23c2fc62bddad0a2c6cf36003577b
SHA167a19bf734520933adfa28afc017c3af1d6a3d5b
SHA2567a6db8aecc2376ec7dfc50085757841523fb69135e364b70c7319bf7a39209d7
SHA5120386671ee83c0825f80a0c95b4e21eb23054878546aff5d8ef63a3bcc6a32c53a61397009aee8e8c5fc171b1ed0e9b69a31111eb1b860e1ff67264fcac806cef