Analysis
-
max time kernel
187s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
21/11/2023, 16:51
General
-
Target
SMSS.exe
-
Size
3.1MB
-
MD5
e13a0155794d4a05bc89613791380236
-
SHA1
d99af2c2846e0c8f4b557903df9b4c1a87585bf6
-
SHA256
5b76a4dbfc0d08d90ce4b0ad4ab6374d0590cb89d369d1cc885bd9be7efb5a6d
-
SHA512
54657d4d3959c33ec8ce6d3e983c05b27aae4081aec9f78c79d9ab16c86c9f052354784e9a8cc8c31482c37eeea402b28d4dfabce68e9ee5d57e534cbeb1929e
-
SSDEEP
49152:HvnI22SsaNYfdPBldt698dBcjH4WRJ6cbR3LoGd/THHB72eh2NT:HvI22SsaNYfdPBldt6+dBcjH4WRJ6m
Malware Config
Extracted
quasar
1.4.1
Pon
7.tcp.eu.ngrok.io:12225
5e9a9d41-187d-4dbc-b58d-2d437b9805a5
-
encryption_key
000B0FC52B6272482F163898894B0BB6D8795F55
-
install_name
smss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
RealSMSS
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1440-0-0x0000000000FA0000-0x00000000012C4000-memory.dmp family_quasar behavioral1/files/0x000700000001abde-5.dat family_quasar behavioral1/files/0x000700000001abde-7.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4644 smss.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1440 SMSS.exe Token: SeDebugPrivilege 4644 smss.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4644 smss.exe 4644 smss.exe 4644 smss.exe 4644 smss.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4644 smss.exe 4644 smss.exe 4644 smss.exe 4644 smss.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4644 smss.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1440 wrote to memory of 4644 1440 SMSS.exe 71 PID 1440 wrote to memory of 4644 1440 SMSS.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\SMSS.exe"C:\Users\Admin\AppData\Local\Temp\SMSS.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\RealSMSS\smss.exe"C:\Users\Admin\AppData\Roaming\RealSMSS\smss.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d63ff49d7c92016feb39812e4db10419
SHA12307d5e35ca9864ffefc93acf8573ea995ba189b
SHA256375076241775962f3edc08a8c72832a00920b427a4f3332528d91d21e909fa12
SHA51200f8c8d0336d6575b956876183199624d6f4d2056f2c0aa633a6f17c516f22ee648062d9bc419254d84c459323e9424f0da8aed9dd4e16c2926e5ba30e797d8a
-
Filesize
3.1MB
MD5e13a0155794d4a05bc89613791380236
SHA1d99af2c2846e0c8f4b557903df9b4c1a87585bf6
SHA2565b76a4dbfc0d08d90ce4b0ad4ab6374d0590cb89d369d1cc885bd9be7efb5a6d
SHA51254657d4d3959c33ec8ce6d3e983c05b27aae4081aec9f78c79d9ab16c86c9f052354784e9a8cc8c31482c37eeea402b28d4dfabce68e9ee5d57e534cbeb1929e
-
Filesize
3.1MB
MD5e13a0155794d4a05bc89613791380236
SHA1d99af2c2846e0c8f4b557903df9b4c1a87585bf6
SHA2565b76a4dbfc0d08d90ce4b0ad4ab6374d0590cb89d369d1cc885bd9be7efb5a6d
SHA51254657d4d3959c33ec8ce6d3e983c05b27aae4081aec9f78c79d9ab16c86c9f052354784e9a8cc8c31482c37eeea402b28d4dfabce68e9ee5d57e534cbeb1929e