Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 13:10
Behavioral task
behavioral1
Sample
surrogate.exe
Resource
win7-20231025-en
General
-
Target
surrogate.exe
-
Size
3.1MB
-
MD5
9fa12d20004165ea56457120cc040515
-
SHA1
231e35f6914f2acb10d3fb587214bc0c7e4b2cd4
-
SHA256
8bc7b03305871f613e3e6435ad6ef4d284350e44f77ee67104bb1d0193557497
-
SHA512
d51db655e00ffcc318e18f61f398206582830836c4a140e19de27b53c3004bcd0fc6a705d5a46dca232af9328de90135040a91253dd550f73311683aaffdf5d2
-
SSDEEP
49152:3vAz92YpaQI6oPZlhP3ReybewoQmxNESE0k/iVLoGdQTTHHB72eh2NT:3va92YpaQI6oPZlhP3YybewoRxrtg
Malware Config
Extracted
quasar
1.4.1
newborn
cock.holyshithowmanydomainandproxycanigettorunmyserver.info:4782
88.209.197.253:4782
5680e0b1-d1d4-41d1-ab33-74f7f95f53fd
-
encryption_key
CEAEA9FD2F3E18352164BB4D9A6F56EFF5E2D896
-
install_name
COM Surrogate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
System32
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral2/memory/4960-0-0x00000000008E0000-0x0000000000C04000-memory.dmp family_quasar behavioral2/files/0x0006000000022e34-6.dat family_quasar behavioral2/files/0x0006000000022e34-8.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3644 COM Surrogate.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\System32 COM Surrogate.exe File created C:\Windows\system32\System32\COM Surrogate.exe surrogate.exe File opened for modification C:\Windows\system32\System32\COM Surrogate.exe surrogate.exe File opened for modification C:\Windows\system32\System32 surrogate.exe File opened for modification C:\Windows\system32\System32\COM Surrogate.exe COM Surrogate.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3508 schtasks.exe 3904 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4960 surrogate.exe Token: SeDebugPrivilege 3644 COM Surrogate.exe Token: SeManageVolumePrivilege 4888 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3644 COM Surrogate.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3508 4960 surrogate.exe 89 PID 4960 wrote to memory of 3508 4960 surrogate.exe 89 PID 4960 wrote to memory of 3644 4960 surrogate.exe 91 PID 4960 wrote to memory of 3644 4960 surrogate.exe 91 PID 3644 wrote to memory of 3904 3644 COM Surrogate.exe 94 PID 3644 wrote to memory of 3904 3644 COM Surrogate.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\surrogate.exe"C:\Users\Admin\AppData\Local\Temp\surrogate.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Windows\system32\System32\COM Surrogate.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3508
-
-
C:\Windows\system32\System32\COM Surrogate.exe"C:\Windows\system32\System32\COM Surrogate.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Windows\system32\System32\COM Surrogate.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3904
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD59fa12d20004165ea56457120cc040515
SHA1231e35f6914f2acb10d3fb587214bc0c7e4b2cd4
SHA2568bc7b03305871f613e3e6435ad6ef4d284350e44f77ee67104bb1d0193557497
SHA512d51db655e00ffcc318e18f61f398206582830836c4a140e19de27b53c3004bcd0fc6a705d5a46dca232af9328de90135040a91253dd550f73311683aaffdf5d2
-
Filesize
3.1MB
MD59fa12d20004165ea56457120cc040515
SHA1231e35f6914f2acb10d3fb587214bc0c7e4b2cd4
SHA2568bc7b03305871f613e3e6435ad6ef4d284350e44f77ee67104bb1d0193557497
SHA512d51db655e00ffcc318e18f61f398206582830836c4a140e19de27b53c3004bcd0fc6a705d5a46dca232af9328de90135040a91253dd550f73311683aaffdf5d2