Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
7a39783b4df44b14c0bc4a9ab62c2870.exe
Resource
win7-20231129-en
General
-
Target
7a39783b4df44b14c0bc4a9ab62c2870.exe
-
Size
18.9MB
-
MD5
7a39783b4df44b14c0bc4a9ab62c2870
-
SHA1
1278ed63bad5d24546584f274527a7c314df8867
-
SHA256
850a2cee4c34bee8c6ee76162c2ead42a8f537e59d257e495b3f0d190c8fd606
-
SHA512
d20beda7af98aea8d27e7423aa1fcb979bd966996848be2cccf9041a6545882be2c241c83d93df318818d7495262020927e0d82abfffe6ef5495415fd9106ca2
-
SSDEEP
393216:rIJm/0ywuOkd8cKjti/2gRJl9Y06abayqgiJXfd9lYbhsk8:rIJVz483iugR39YMsgqXfzlYbm
Malware Config
Extracted
quasar
1.4.0
BRAVE21
pettbull.ddns.net:4782
06538f38-9c19-4cdf-83c8-8fafb759e15a
-
encryption_key
DAE9E02E5E04D59D9AF2AA1D5E82248D5919AC6A
-
install_name
Windows Update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft Windows
-
subdirectory
System32
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2476-95-0x0000000000400000-0x0000000000484000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 7a39783b4df44b14c0bc4a9ab62c2870.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe Powershell.exe -
Executes dropped EXE 5 IoCs
pid Process 2208 Host file.exe 2392 Host file.exe 2476 Host file.exe 1936 ytd6-setup.exe 468 ytd6-setup.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 api.ipify.org 50 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 2476 2208 Host file.exe 100 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\YTD\YTD\ytd6-setup.exe 7a39783b4df44b14c0bc4a9ab62c2870.exe File opened for modification C:\Program Files (x86)\YTD\YTD\Uninstall.exe 7a39783b4df44b14c0bc4a9ab62c2870.exe File created C:\Program Files (x86)\YTD\YTD\Uninstall.ini 7a39783b4df44b14c0bc4a9ab62c2870.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3904 Powershell.exe 2208 Host file.exe 2208 Host file.exe 3904 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2208 Host file.exe Token: SeDebugPrivilege 3904 Powershell.exe Token: SeDebugPrivilege 2476 Host file.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3204 wrote to memory of 2208 3204 7a39783b4df44b14c0bc4a9ab62c2870.exe 91 PID 3204 wrote to memory of 2208 3204 7a39783b4df44b14c0bc4a9ab62c2870.exe 91 PID 3204 wrote to memory of 2208 3204 7a39783b4df44b14c0bc4a9ab62c2870.exe 91 PID 2208 wrote to memory of 3904 2208 Host file.exe 97 PID 2208 wrote to memory of 3904 2208 Host file.exe 97 PID 2208 wrote to memory of 3904 2208 Host file.exe 97 PID 2208 wrote to memory of 2392 2208 Host file.exe 99 PID 2208 wrote to memory of 2392 2208 Host file.exe 99 PID 2208 wrote to memory of 2392 2208 Host file.exe 99 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 2208 wrote to memory of 2476 2208 Host file.exe 100 PID 3204 wrote to memory of 1936 3204 7a39783b4df44b14c0bc4a9ab62c2870.exe 101 PID 3204 wrote to memory of 1936 3204 7a39783b4df44b14c0bc4a9ab62c2870.exe 101 PID 3204 wrote to memory of 1936 3204 7a39783b4df44b14c0bc4a9ab62c2870.exe 101 PID 1936 wrote to memory of 468 1936 ytd6-setup.exe 102 PID 1936 wrote to memory of 468 1936 ytd6-setup.exe 102 PID 1936 wrote to memory of 468 1936 ytd6-setup.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a39783b4df44b14c0bc4a9ab62c2870.exe"C:\Users\Admin\AppData\Local\Temp\7a39783b4df44b14c0bc4a9ab62c2870.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Roaming\Host file.exe"C:\Users\Admin\AppData\Roaming\Host file.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Copy-Item 'C:\Users\Admin\AppData\Roaming\Host file.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.exe'3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
C:\Users\Admin\AppData\Roaming\Host file.exe"C:\Users\Admin\AppData\Roaming\Host file.exe"3⤵
- Executes dropped EXE
PID:2392
-
-
C:\Users\Admin\AppData\Roaming\Host file.exe"C:\Users\Admin\AppData\Roaming\Host file.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
-
C:\Program Files (x86)\YTD\YTD\ytd6-setup.exe"C:\Program Files (x86)\YTD\YTD\ytd6-setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\is-4N6JL.tmp\ytd6-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-4N6JL.tmp\ytd6-setup.tmp" /SL5="$D0034,18756843,57856,C:\Program Files (x86)\YTD\YTD\ytd6-setup.exe"3⤵
- Executes dropped EXE
PID:468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD59810620c9f1a0b7e886416f4a3f7eb94
SHA1b99ae8de27e3dd7e4a25d2fcc3df8e26feb9d88f
SHA256c3c5ca64ede8d810a40ca9966e8a9c00c30ea96a9ce4ca2d6764943c42bcfa99
SHA512b5a5e81f998067d5e6236388ef922718d8648f0c45afaff5125cccda2f3847143f7a7d73887f5d591375adf3656d8a924224bb8122e185a617bc59636f7d5b45
-
Filesize
79KB
MD53c314674d4d74dc823311c67f438ba6c
SHA1f3575aeda09472556c57345857ec31883341de1a
SHA256d1a65053cff1b25f4f2b835c19aa9741fc98635cfb587255cc2442221cd40edc
SHA512d892fad0ac521b35010fbb3d9d55175ef2ffee6549e0309650060c98af651be4a5ce6f78d8f1050c1bf306d04ba1abc6e98d19d9b1b3dc501a05ea12787f50ae
-
Filesize
108KB
MD5788bcef92618d51edb3ab3ebd08a138d
SHA15ac583b279c02ede7c09a50634aeea645eec248e
SHA256da0c97775316befb0b17ac151a631dd8d0213e73d0c4053f1a53827949c4913a
SHA51225a6e38e71a1d7c01724e9fd9f9b014c9ba2db022793d57ecc27fe469b4240b038a996adc9c62e07f81d1bcc4305d48329d9337ac49a893762010ed1261adbeb
-
Filesize
706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
507KB
MD5cd3e75de9a1f183fab974c11a00b7ea5
SHA138e33aa2038faae2178f582d0b9374dd8b31e22b
SHA2562800f2cbf8edf0aaa0533969dafac93b02ec5a2d494957f63daa71df81a11fd5
SHA51222349032d90e97c5047e3e6f0a906dd23365dc4e295c1795b158be19b5c8a76b5fe96c5d5559735996339c18dd007d03fc4b353970fd0d24b85e9eeea080cc98
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
302KB
MD5b63301a22e6d3dead6f8617e06e98371
SHA19a986df6f4cd86a058febfcb911ffdf9046c73b3
SHA256e5566581a3f88fb64864e9f4227cce0056a8e7d1f9db1501eb66fb300f09b211
SHA512c494c95b50eea823c504adc208b95fce13f7a86c402704aef6c4af271839f4548346fcf9d487af308d39e17f9b6b9b2c31f982c96a0f94e46495f55e2193ccb8
-
Filesize
125KB
MD5fb5d05b08b2fc13109ddc224e8ab496e
SHA1c3613a8c2794bdbfd2c129f7a74c593538cad744
SHA25663669ca5cbd9849e992c9ae402ce66f4cdaf17c9bebfebbce421e47dd191c3b7
SHA51264533a2d99818f8b60f7f1e50eb3b15f4b11ed6dcacfc9878fd134290b200e12ec4d192502bf8e7522828d06b98ee12830079db804ef656e0f83a59053ffdb41
-
Filesize
531KB
MD530bdc31542ecfba7a954a715d70cc480
SHA1fae8dfb2f5eb516d1002c9bbe0886e9f57e96efe
SHA256a52b8be57a504d5b861d3aab2607c9615a535ea5b024749eb949363df8c6da95
SHA512a4a65817c969d6773742c56a4a2f073cc78697c39231911f83b7e76da201b9128a8f311b602cfa5475f51b5224ff6d35dd1e72ef3025a218ce7b55aaa013cd4a
-
Filesize
640KB
MD5c8d2bf10b5984639d0978a376c188f22
SHA14aec3555c0077b99383828d37113de5c9df0d0e0
SHA256cceb592fdf3febdc10e629b5dca6d3f1323910562ff090b7206147988f26fbe8
SHA512321137646b3cc94ffe4241110838b4e972e5f9df49ce0fe96ebbcd671f2063e1dad0e235054bb4cedd3e97143c903f1156404ddb72c3588e8733d6d9f37d7048
-
Filesize
315KB
MD5eabedf6c039b591c9f722d5e1a94c6a4
SHA1debbd01dc92bbc4566511aa4121739c084844770
SHA256aa9ff25d1afdaae958392c50f1b0d90ee6d66a8df878ac90e69e26c1176e3636
SHA51298106f3e54e13cf6aa6470f417f62648e08cd749ebe71067e62e01aa084dc6fc010ca7fc9c29952aeeea4f629358b7fb7bcd2845d983400f00bcee40d0544ccd
-
Filesize
248KB
MD504738149bb9c3624ad350e980b32dcf0
SHA1308b29b7b1bb99ec1faff1d0f81b6cfef2900d2e
SHA25673f9d80a6bac8ce6b07370ed36eee2346cc84b0a43daa124eaa610d8081106aa
SHA512bd16ee542e08e1d8d846f1a144c6000aa685d85c6541fc0854f8146bfac84171c73a3f492b8eda4a3e99f77a8692f20b6b1d8164fc71de8ee33d65aa061ef10a