Analysis
-
max time kernel
1s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:12
Behavioral task
behavioral1
Sample
9b664d1737e4b08517167fff2d19bade.exe
Resource
win7-20231215-en
General
-
Target
9b664d1737e4b08517167fff2d19bade.exe
-
Size
535KB
-
MD5
9b664d1737e4b08517167fff2d19bade
-
SHA1
dbbc1588618273813ca9f3de2708f4f4b7934029
-
SHA256
ed07371994b2bce11a662df8ab5603ed80a73c30cdd4f29d922eae221320a39b
-
SHA512
955e24ab139489a2835f553d6e58ebeb2af7dae20317c6510e3289a902bbf2a7ed329776dfc7afaa948d61fd0cd47b7216017003eaa410d4d07348e19848484c
-
SSDEEP
12288:VuxMRH2MMvs5v5iX7K+k2dV++kQgog5Y:VWu2MMv5++kRc
Malware Config
Extracted
quasar
2.1.0.0
Hacked
Cheaper-60753.portmap.host:62240
VNM_MUTEX_7KSPEPYRO6LRW25BBT
-
encryption_key
SPWhfeGvCah4GWzpm6Am
-
install_name
Host Process for Windows Tasks.exe
-
log_directory
Microsoft
-
reconnect_delay
1000
-
startup_key
Host Process for Windows Services
-
subdirectory
MIcrosoft
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/2848-0-0x0000000000640000-0x00000000006CC000-memory.dmp disable_win_def behavioral2/files/0x000600000002320f-12.dat disable_win_def -
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2848-0-0x0000000000640000-0x00000000006CC000-memory.dmp family_quasar behavioral2/files/0x000600000002320f-12.dat family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 ip-api.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4808 1240 WerFault.exe 92 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3616 schtasks.exe 1784 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b664d1737e4b08517167fff2d19bade.exe"C:\Users\Admin\AppData\Local\Temp\9b664d1737e4b08517167fff2d19bade.exe"1⤵PID:2848
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵PID:872
-
-
C:\Windows\SysWOW64\MIcrosoft\Host Process for Windows Tasks.exe"C:\Windows\SysWOW64\MIcrosoft\Host Process for Windows Tasks.exe"2⤵PID:1240
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Host Process for Windows Services" /sc ONLOGON /tr "C:\Windows\SysWOW64\MIcrosoft\Host Process for Windows Tasks.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IylUp5Lhe8sF.bat" "3⤵PID:432
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:4604
-
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:4516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 19963⤵
- Program crash
PID:4808
-
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Host Process for Windows Services" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\9b664d1737e4b08517167fff2d19bade.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1240 -ip 12401⤵PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD59b9c12b73c35a8db6170f48bec0ab66e
SHA1058280fd49d3359221544c96a6055ce6e5639a0e
SHA2569fada7f880208b2901ba85be0981de322c474ff5b92b2e3e9e1dbfd2224bbb66
SHA5123f78dad8146c13122d3175d39d955089b7d728774f5d0c33477f5299ea957bd0c8921a98c71a1015a836bbc2e07e067b3f316b1d5f97ee85e5577edfb2406d69
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
535KB
MD59b664d1737e4b08517167fff2d19bade
SHA1dbbc1588618273813ca9f3de2708f4f4b7934029
SHA256ed07371994b2bce11a662df8ab5603ed80a73c30cdd4f29d922eae221320a39b
SHA512955e24ab139489a2835f553d6e58ebeb2af7dae20317c6510e3289a902bbf2a7ed329776dfc7afaa948d61fd0cd47b7216017003eaa410d4d07348e19848484c