Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
189s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/01/2024, 13:45
Behavioral task
behavioral1
Sample
Image Logger.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral2
Sample
Image Logger.exe
Resource
win11-20231215-en
General
-
Target
Image Logger.exe
-
Size
3.1MB
-
MD5
6af433dc5c20b6c59cb8c2b63ddf4963
-
SHA1
e378ad8a93a6859afb38f10332a044b1b898baca
-
SHA256
cbe49c46c68fbf9a6733b839945e3eb01c02ee26e7a327ebb54aacad4e765a2b
-
SHA512
4ba72e6858d3aecc2f87d0b23516ae7915df49fcbb91747c5d24462750e867956b1bb72e5fda397c8eb7a95d67440125de01167f78d79bc946b1397ec35e0de0
-
SSDEEP
49152:bvrI22SsaNYfdPBldt698dBcjHRMxNESExk/iHLoGdhYTHHB72eh2NT:bvU22SsaNYfdPBldt6+dBcjHWxwrR
Malware Config
Extracted
quasar
1.4.1
Image Logger
promptylol-31420.portmap.io:5950
4cdcc137-c98a-4223-9eca-fa3c3f414513
-
encryption_key
92AAA484892AFDE2F29DD42856FA1D969FC2CCFE
-
install_name
sys.exe
-
log_directory
Logs
-
reconnect_delay
2995
-
startup_key
bootmgr
-
subdirectory
critical
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral2/memory/1912-0-0x0000000000980000-0x0000000000CA4000-memory.dmp family_quasar behavioral2/files/0x0003000000029d82-8.dat family_quasar behavioral2/files/0x0003000000029d82-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2456 sys.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\critical\sys.exe Image Logger.exe File opened for modification C:\Windows\system32\critical\sys.exe Image Logger.exe File opened for modification C:\Windows\system32\critical Image Logger.exe File opened for modification C:\Windows\system32\critical\sys.exe sys.exe File opened for modification C:\Windows\system32\critical sys.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe 8 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1912 Image Logger.exe Token: SeDebugPrivilege 2456 sys.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2456 sys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1912 wrote to memory of 8 1912 Image Logger.exe 79 PID 1912 wrote to memory of 8 1912 Image Logger.exe 79 PID 1912 wrote to memory of 2456 1912 Image Logger.exe 81 PID 1912 wrote to memory of 2456 1912 Image Logger.exe 81 PID 2456 wrote to memory of 2992 2456 sys.exe 83 PID 2456 wrote to memory of 2992 2456 sys.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Image Logger.exe"C:\Users\Admin\AppData\Local\Temp\Image Logger.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "bootmgr" /sc ONLOGON /tr "C:\Windows\system32\critical\sys.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:8
-
-
C:\Windows\system32\critical\sys.exe"C:\Windows\system32\critical\sys.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "bootmgr" /sc ONLOGON /tr "C:\Windows\system32\critical\sys.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55803ccf5155f520079613ac49d67a636
SHA196f69470c9bd8dcbf57236b6f122e99cc9ec9f82
SHA256cf3cefecf17f16ba1f8c0615482d3885a0e666c0317ea570c8d67a03a4cc7f9a
SHA5129cdec09aa0bd484d0b3079f7a2e18b6823b8f4138298d5c9d89956b42ab47deb14f828699c90766deb9529dacd5b1a6a3472a084478d15921358411d7711ffcb
-
Filesize
1024KB
MD5e727148f1f7be4f02aadd6f0cbea5d22
SHA1f8b4d2cf1c0512a90bd8ef38d9a0e4aa3ee55585
SHA2561c4d87a4af50a4e3e31c792083502e21d1a3d96f3e474d3966beca4d57358de0
SHA51217843531e006ffd7227e71c9793849face2b6a0fdb8adf2a82aec927537425a7b3f5511dec0ad65fac496b883bdf0093f40d3ca4fedf18a1c7884427035663c8