Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03/08/2023, 16:10
Behavioral task
behavioral1
Sample
Free Robux.exe
Resource
win7-20230712-en
General
-
Target
Free Robux.exe
-
Size
3.1MB
-
MD5
12dfc98e55d187e82fe2207383447e0b
-
SHA1
efb3fb106202b9a12f1894e703fcee27cb93e28c
-
SHA256
78980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f
-
SHA512
410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9
-
SSDEEP
49152:DvBuf2NUaNmwzPWlvdaKM7ZxTwdlRJ64bR3LoGdQTHHB72eh2NT:Dvcf2NUaNmwzPWlvdaB7ZxTwdlRJ6S
Malware Config
Extracted
quasar
1.4.1
Infected
192.168.1.1:4782
192.168.1.66:4782
dark-crystal.at.ply.gg:4782
ff410ede-beff-4970-8e12-7d251057f1fd
-
encryption_key
1B172706DED462B59F2A5056AB06A8DD1EE8491B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek Audio
-
subdirectory
SubDir
Signatures
-
Quasar payload 7 IoCs
resource yara_rule behavioral1/memory/2168-54-0x0000000000330000-0x0000000000654000-memory.dmp family_quasar behavioral1/files/0x000d000000012258-60.dat family_quasar behavioral1/files/0x000d000000012258-61.dat family_quasar behavioral1/memory/2576-64-0x00000000008E0000-0x0000000000C04000-memory.dmp family_quasar behavioral1/files/0x000d000000012258-78.dat family_quasar behavioral1/files/0x000d000000012258-93.dat family_quasar behavioral1/memory/1636-94-0x00000000003B0000-0x00000000006D4000-memory.dmp family_quasar -
Executes dropped EXE 3 IoCs
pid Process 2576 Client.exe 2300 Client.exe 1636 Client.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\SubDir Free Robux.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File created C:\Windows\system32\SubDir\Client.exe Free Robux.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Free Robux.exe File opened for modification C:\Windows\system32\SubDir Client.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2472 schtasks.exe 1448 schtasks.exe 2836 schtasks.exe 1012 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2908 PING.EXE 576 PING.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2168 Free Robux.exe Token: SeDebugPrivilege 2576 Client.exe Token: SeDebugPrivilege 2300 Client.exe Token: SeDebugPrivilege 1636 Client.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2576 Client.exe 2300 Client.exe 1636 Client.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2472 2168 Free Robux.exe 28 PID 2168 wrote to memory of 2472 2168 Free Robux.exe 28 PID 2168 wrote to memory of 2472 2168 Free Robux.exe 28 PID 2168 wrote to memory of 2576 2168 Free Robux.exe 30 PID 2168 wrote to memory of 2576 2168 Free Robux.exe 30 PID 2168 wrote to memory of 2576 2168 Free Robux.exe 30 PID 2576 wrote to memory of 1448 2576 Client.exe 31 PID 2576 wrote to memory of 1448 2576 Client.exe 31 PID 2576 wrote to memory of 1448 2576 Client.exe 31 PID 2576 wrote to memory of 1964 2576 Client.exe 35 PID 2576 wrote to memory of 1964 2576 Client.exe 35 PID 2576 wrote to memory of 1964 2576 Client.exe 35 PID 1964 wrote to memory of 2856 1964 cmd.exe 37 PID 1964 wrote to memory of 2856 1964 cmd.exe 37 PID 1964 wrote to memory of 2856 1964 cmd.exe 37 PID 1964 wrote to memory of 2908 1964 cmd.exe 38 PID 1964 wrote to memory of 2908 1964 cmd.exe 38 PID 1964 wrote to memory of 2908 1964 cmd.exe 38 PID 1964 wrote to memory of 2300 1964 cmd.exe 39 PID 1964 wrote to memory of 2300 1964 cmd.exe 39 PID 1964 wrote to memory of 2300 1964 cmd.exe 39 PID 2300 wrote to memory of 2836 2300 Client.exe 40 PID 2300 wrote to memory of 2836 2300 Client.exe 40 PID 2300 wrote to memory of 2836 2300 Client.exe 40 PID 2300 wrote to memory of 2696 2300 Client.exe 42 PID 2300 wrote to memory of 2696 2300 Client.exe 42 PID 2300 wrote to memory of 2696 2300 Client.exe 42 PID 2696 wrote to memory of 1136 2696 cmd.exe 44 PID 2696 wrote to memory of 1136 2696 cmd.exe 44 PID 2696 wrote to memory of 1136 2696 cmd.exe 44 PID 2696 wrote to memory of 576 2696 cmd.exe 45 PID 2696 wrote to memory of 576 2696 cmd.exe 45 PID 2696 wrote to memory of 576 2696 cmd.exe 45 PID 2696 wrote to memory of 1636 2696 cmd.exe 46 PID 2696 wrote to memory of 1636 2696 cmd.exe 46 PID 2696 wrote to memory of 1636 2696 cmd.exe 46 PID 1636 wrote to memory of 1012 1636 Client.exe 47 PID 1636 wrote to memory of 1012 1636 Client.exe 47 PID 1636 wrote to memory of 1012 1636 Client.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\Free Robux.exe"C:\Users\Admin\AppData\Local\Temp\Free Robux.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Realtek Audio" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2472
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Realtek Audio" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1448
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5OMVch2ODUJk.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2856
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:2908
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Realtek Audio" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:2836
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\I10d35nuGkpL.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1136
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
PID:576
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Realtek Audio" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:1012
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196B
MD51e282471a7137e92029b117f26cd179e
SHA14dfbeb22adea1da446718297671fef9e6d711706
SHA256072c9ac0d5b07ddf7ad794f8e74845dbeb03b10a6f05d263b4dc2f5282394d44
SHA5127904c32244fb06d92a873a47c76c046842b4b38582a86fb8adf99dd6af5a14885247b4397e318bfb73818230bdfe0d4e6e4f7783043c4c10871eabc0874e46c0
-
Filesize
196B
MD51e282471a7137e92029b117f26cd179e
SHA14dfbeb22adea1da446718297671fef9e6d711706
SHA256072c9ac0d5b07ddf7ad794f8e74845dbeb03b10a6f05d263b4dc2f5282394d44
SHA5127904c32244fb06d92a873a47c76c046842b4b38582a86fb8adf99dd6af5a14885247b4397e318bfb73818230bdfe0d4e6e4f7783043c4c10871eabc0874e46c0
-
Filesize
196B
MD5b4dafa01d6f40658e7c68cd1f901667f
SHA177b1e251ceb57c46863e71814005fd18b0c93d92
SHA256810270b3e5e19aac91b8140307c3667f666406effd31b351c6002fe21e71c88c
SHA512729b28484432086cf34a18190ba6f776b04f7197802bcb76d0659e418ac8cd6ed0c0c161dfbf76cbdd473665b0355e662a89c21126ef265cc3c434a0ea7fea04
-
Filesize
196B
MD5b4dafa01d6f40658e7c68cd1f901667f
SHA177b1e251ceb57c46863e71814005fd18b0c93d92
SHA256810270b3e5e19aac91b8140307c3667f666406effd31b351c6002fe21e71c88c
SHA512729b28484432086cf34a18190ba6f776b04f7197802bcb76d0659e418ac8cd6ed0c0c161dfbf76cbdd473665b0355e662a89c21126ef265cc3c434a0ea7fea04
-
Filesize
3.1MB
MD512dfc98e55d187e82fe2207383447e0b
SHA1efb3fb106202b9a12f1894e703fcee27cb93e28c
SHA25678980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f
SHA512410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9
-
Filesize
3.1MB
MD512dfc98e55d187e82fe2207383447e0b
SHA1efb3fb106202b9a12f1894e703fcee27cb93e28c
SHA25678980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f
SHA512410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9
-
Filesize
3.1MB
MD512dfc98e55d187e82fe2207383447e0b
SHA1efb3fb106202b9a12f1894e703fcee27cb93e28c
SHA25678980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f
SHA512410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9
-
Filesize
3.1MB
MD512dfc98e55d187e82fe2207383447e0b
SHA1efb3fb106202b9a12f1894e703fcee27cb93e28c
SHA25678980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f
SHA512410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9