Analysis
-
max time kernel
1655s -
max time network
1153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 20:06
Behavioral task
behavioral1
Sample
MagmaFN.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
MagmaFN.exe
Resource
win10-20230703-en
General
-
Target
MagmaFN.exe
-
Size
3.1MB
-
MD5
22b9ae401f28ade71bc0a15b3972fbfe
-
SHA1
c5857061edffe27d21730b565d2e3cacea7a7bf0
-
SHA256
dd0956427cdc7ad6703c85171373a1d060700f485a18daf1afc56567ffe163ff
-
SHA512
cea1124314555010d3091937259a34c43c92d2452ddbb8dea7f60e9687a47c48c41fe69c30304be392ac8f811e46266c1a0e80737fff11e068386944264ad277
-
SSDEEP
49152:DveI22SsaNYfdPBldt698dBcjHQTZ01JpLoGddjTHHB72eh2NT:DvT22SsaNYfdPBldt6+dBcjHQTZCt
Malware Config
Extracted
quasar
1.4.1
MagmaFN
4.tcp.eu.ngrok.io:16321
8fcfd45a-1b32-4b49-b4cd-15666fd937b0
-
encryption_key
D586A40D2F782DE3D9154F379894244F11BE65C1
-
install_name
MagmaFN.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Update Scheduler
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral3/memory/4636-0-0x00000000008C0000-0x0000000000BE4000-memory.dmp family_quasar behavioral3/files/0x0006000000023021-5.dat family_quasar behavioral3/files/0x0006000000023021-7.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 852 MagmaFN.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4632 schtasks.exe 4148 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3372 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4636 MagmaFN.exe Token: SeDebugPrivilege 852 MagmaFN.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 852 MagmaFN.exe 852 MagmaFN.exe 852 MagmaFN.exe 852 MagmaFN.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 852 MagmaFN.exe 852 MagmaFN.exe 852 MagmaFN.exe 852 MagmaFN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 852 MagmaFN.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4148 4636 MagmaFN.exe 89 PID 4636 wrote to memory of 4148 4636 MagmaFN.exe 89 PID 4636 wrote to memory of 852 4636 MagmaFN.exe 91 PID 4636 wrote to memory of 852 4636 MagmaFN.exe 91 PID 852 wrote to memory of 4632 852 MagmaFN.exe 92 PID 852 wrote to memory of 4632 852 MagmaFN.exe 92 PID 852 wrote to memory of 1532 852 MagmaFN.exe 97 PID 852 wrote to memory of 1532 852 MagmaFN.exe 97 PID 852 wrote to memory of 1092 852 MagmaFN.exe 99 PID 852 wrote to memory of 1092 852 MagmaFN.exe 99 PID 1092 wrote to memory of 2972 1092 cmd.exe 101 PID 1092 wrote to memory of 2972 1092 cmd.exe 101 PID 1092 wrote to memory of 3372 1092 cmd.exe 102 PID 1092 wrote to memory of 3372 1092 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\MagmaFN.exe"C:\Users\Admin\AppData\Local\Temp\MagmaFN.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java Update Scheduler" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\MagmaFN.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4148
-
-
C:\Users\Admin\AppData\Roaming\MagmaFN.exe"C:\Users\Admin\AppData\Roaming\MagmaFN.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java Update Scheduler" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\MagmaFN.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4632
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /delete /tn "Java Update Scheduler" /f3⤵PID:1532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\urMb90mffQjy.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:3372
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
205B
MD5584c6796ca69cb3204ebea93ca90121d
SHA13b99329d0a20e13d9eea2d5a387b1f4cf59213c3
SHA2561700853033530fd967c5619d576fba6269a8669b3861ead0d98c88a933b0759b
SHA5128d9b169eeb5950296a0c74fd03e7e31ff15dfbf0ed5023031031146f67c017c326877e727a4934034608353996bf98f4a0bf9246831c1afaa4978d7aec9d0951
-
Filesize
3.1MB
MD522b9ae401f28ade71bc0a15b3972fbfe
SHA1c5857061edffe27d21730b565d2e3cacea7a7bf0
SHA256dd0956427cdc7ad6703c85171373a1d060700f485a18daf1afc56567ffe163ff
SHA512cea1124314555010d3091937259a34c43c92d2452ddbb8dea7f60e9687a47c48c41fe69c30304be392ac8f811e46266c1a0e80737fff11e068386944264ad277
-
Filesize
3.1MB
MD522b9ae401f28ade71bc0a15b3972fbfe
SHA1c5857061edffe27d21730b565d2e3cacea7a7bf0
SHA256dd0956427cdc7ad6703c85171373a1d060700f485a18daf1afc56567ffe163ff
SHA512cea1124314555010d3091937259a34c43c92d2452ddbb8dea7f60e9687a47c48c41fe69c30304be392ac8f811e46266c1a0e80737fff11e068386944264ad277