Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 02:00
Behavioral task
behavioral1
Sample
SinfulSpoofer.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SinfulSpoofer.exe
Resource
win10-20230703-en
General
-
Target
SinfulSpoofer.exe
-
Size
3.1MB
-
MD5
077b84625de8f630b622ed151725ebd8
-
SHA1
d39c4979e424f42b7143d2b41d6e00409ac10416
-
SHA256
61ab43579080b8f581254ffc1bc1d38d8a2da8f2c1d9c7f483e2edd00117145a
-
SHA512
598c46f86e72c768511c5d58d08a75ae0e57b3a989f6f3f04bb3ecdcee42353a94e8699174aeb4f228bf37abc890f462ee0edcf7017a88bebb321629fbc123b6
-
SSDEEP
49152:Cvht62XlaSFNWPjljiFa2RoUYIKvooBxisoGdLTHHB72eh2NT:CvL62XlaSFNWPjljiFXRoUYIGoA
Malware Config
Extracted
quasar
1.4.1
fasdasd
2.tcp.ngrok.io:16241
d6ac566a-6fde-440a-b17c-aa5d54d19e93
-
encryption_key
02C7E31FB83C81538B3B7AEA158F1FCCDC2B0FEA
-
install_name
asdsdasd.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SystEm32
-
subdirectory
dasdasd
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral3/memory/2488-0-0x0000000000D50000-0x0000000001074000-memory.dmp family_quasar behavioral3/files/0x00070000000231fb-6.dat family_quasar behavioral3/files/0x00070000000231fb-7.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3892 asdsdasd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3596 schtasks.exe 4260 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2488 SinfulSpoofer.exe Token: SeDebugPrivilege 3892 asdsdasd.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3892 asdsdasd.exe 3892 asdsdasd.exe 3892 asdsdasd.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3892 asdsdasd.exe 3892 asdsdasd.exe 3892 asdsdasd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3892 asdsdasd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3596 2488 SinfulSpoofer.exe 81 PID 2488 wrote to memory of 3596 2488 SinfulSpoofer.exe 81 PID 2488 wrote to memory of 3892 2488 SinfulSpoofer.exe 83 PID 2488 wrote to memory of 3892 2488 SinfulSpoofer.exe 83 PID 3892 wrote to memory of 4260 3892 asdsdasd.exe 84 PID 3892 wrote to memory of 4260 3892 asdsdasd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\SinfulSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\SinfulSpoofer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3596
-
-
C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5077b84625de8f630b622ed151725ebd8
SHA1d39c4979e424f42b7143d2b41d6e00409ac10416
SHA25661ab43579080b8f581254ffc1bc1d38d8a2da8f2c1d9c7f483e2edd00117145a
SHA512598c46f86e72c768511c5d58d08a75ae0e57b3a989f6f3f04bb3ecdcee42353a94e8699174aeb4f228bf37abc890f462ee0edcf7017a88bebb321629fbc123b6
-
Filesize
3.1MB
MD5077b84625de8f630b622ed151725ebd8
SHA1d39c4979e424f42b7143d2b41d6e00409ac10416
SHA25661ab43579080b8f581254ffc1bc1d38d8a2da8f2c1d9c7f483e2edd00117145a
SHA512598c46f86e72c768511c5d58d08a75ae0e57b3a989f6f3f04bb3ecdcee42353a94e8699174aeb4f228bf37abc890f462ee0edcf7017a88bebb321629fbc123b6