Analysis
-
max time kernel
130s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
4942e9c13479bc1a62bdb07b23474e3c.exe
Resource
win7-20231215-en
General
-
Target
4942e9c13479bc1a62bdb07b23474e3c.exe
-
Size
639KB
-
MD5
4942e9c13479bc1a62bdb07b23474e3c
-
SHA1
d7a7283939a2fa4506b47fa809431b9cc4d2559e
-
SHA256
5b11f30be6e3bfb808c25d07b492cfa12840fd0efa795d8af397feba045d1c59
-
SHA512
8c8edd299922fcfa100e3e725d1b09259a86e41546361273c386177a3e2a765ffc76169a5b9d142efb4c5335bee3805c1f908c7f4edae0f0a33f2631a037eb59
-
SSDEEP
12288:66bJhnrd2Qsm/+/dnGz7O0Y244sMYcoFMVyMg+Yy1Wcwemn58WgxWM:6kJhngpn9kNsMwbMgkK58WgQM
Malware Config
Extracted
quasar
2.1.0.0
SEP05
23.105.131.187:7812
VNM_MUTEX_ea14HLQ5adxyrFdD2X
-
encryption_key
jUWfdDb1toPE0KAlGJWH
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update Service
-
subdirectory
Windows Security Update
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2300-17-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2300-15-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2300-13-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2300-10-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2300-9-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 4942e9c13479bc1a62bdb07b23474e3c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4942e9c13479bc1a62bdb07b23474e3c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4942e9c13479bc1a62bdb07b23474e3c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4942e9c13479bc1a62bdb07b23474e3c.exe -
Quasar payload 5 IoCs
resource yara_rule behavioral1/memory/2300-17-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2300-15-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2300-13-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2300-10-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2300-9-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 2876 Windows Security.exe 2632 Windows Security.exe -
Loads dropped DLL 2 IoCs
pid Process 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 2876 Windows Security.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 4942e9c13479bc1a62bdb07b23474e3c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4942e9c13479bc1a62bdb07b23474e3c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\jEWDfCdAGM = "C:\\Users\\Admin\\AppData\\Roaming\\EcGASfXzFi\\SgBSNdRiPF.exe" 4942e9c13479bc1a62bdb07b23474e3c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2128 set thread context of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2876 set thread context of 2632 2876 Windows Security.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2928 schtasks.exe 1692 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 324 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2708 powershell.exe 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 1632 4942e9c13479bc1a62bdb07b23474e3c.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2300 4942e9c13479bc1a62bdb07b23474e3c.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2632 Windows Security.exe Token: SeDebugPrivilege 2632 Windows Security.exe Token: SeDebugPrivilege 1632 4942e9c13479bc1a62bdb07b23474e3c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2632 Windows Security.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2128 wrote to memory of 2300 2128 4942e9c13479bc1a62bdb07b23474e3c.exe 28 PID 2300 wrote to memory of 2928 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 30 PID 2300 wrote to memory of 2928 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 30 PID 2300 wrote to memory of 2928 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 30 PID 2300 wrote to memory of 2928 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 30 PID 2300 wrote to memory of 2876 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 37 PID 2300 wrote to memory of 2876 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 37 PID 2300 wrote to memory of 2876 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 37 PID 2300 wrote to memory of 2876 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 37 PID 2300 wrote to memory of 2708 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 34 PID 2300 wrote to memory of 2708 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 34 PID 2300 wrote to memory of 2708 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 34 PID 2300 wrote to memory of 2708 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 34 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2876 wrote to memory of 2632 2876 Windows Security.exe 33 PID 2632 wrote to memory of 1692 2632 Windows Security.exe 36 PID 2632 wrote to memory of 1692 2632 Windows Security.exe 36 PID 2632 wrote to memory of 1692 2632 Windows Security.exe 36 PID 2632 wrote to memory of 1692 2632 Windows Security.exe 36 PID 2300 wrote to memory of 2668 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 44 PID 2300 wrote to memory of 2668 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 44 PID 2300 wrote to memory of 2668 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 44 PID 2300 wrote to memory of 2668 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 44 PID 2668 wrote to memory of 2296 2668 cmd.exe 39 PID 2668 wrote to memory of 2296 2668 cmd.exe 39 PID 2668 wrote to memory of 2296 2668 cmd.exe 39 PID 2668 wrote to memory of 2296 2668 cmd.exe 39 PID 2300 wrote to memory of 2752 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 43 PID 2300 wrote to memory of 2752 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 43 PID 2300 wrote to memory of 2752 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 43 PID 2300 wrote to memory of 2752 2300 4942e9c13479bc1a62bdb07b23474e3c.exe 43 PID 2752 wrote to memory of 2268 2752 cmd.exe 41 PID 2752 wrote to memory of 2268 2752 cmd.exe 41 PID 2752 wrote to memory of 2268 2752 cmd.exe 41 PID 2752 wrote to memory of 2268 2752 cmd.exe 41 PID 2752 wrote to memory of 324 2752 cmd.exe 40 PID 2752 wrote to memory of 324 2752 cmd.exe 40 PID 2752 wrote to memory of 324 2752 cmd.exe 40 PID 2752 wrote to memory of 324 2752 cmd.exe 40 PID 2752 wrote to memory of 1632 2752 cmd.exe 50 PID 2752 wrote to memory of 1632 2752 cmd.exe 50 PID 2752 wrote to memory of 1632 2752 cmd.exe 50 PID 2752 wrote to memory of 1632 2752 cmd.exe 50 PID 1632 wrote to memory of 560 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 49 PID 1632 wrote to memory of 560 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 49 PID 1632 wrote to memory of 560 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 49 PID 1632 wrote to memory of 560 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 49 PID 1632 wrote to memory of 844 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 48 PID 1632 wrote to memory of 844 1632 4942e9c13479bc1a62bdb07b23474e3c.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Update\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security Update\Windows Security.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2876
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\TYBkfR5mTgJm.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2668
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Security Update\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Security Update\Windows Security.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Security Update\Windows Security.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*1⤵PID:2296
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost1⤵
- Runs ping.exe
PID:324
-
C:\Windows\SysWOW64\chcp.comchcp 650011⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"1⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"1⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"1⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"1⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"C:\Users\Admin\AppData\Local\Temp\4942e9c13479bc1a62bdb07b23474e3c.exe"1⤵PID:560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
229B
MD5d44b07e33c2286868964b63090640dd3
SHA1a00ed7a650998a10a183b168cfbd2a7e98ad08aa
SHA256b9e9ebcc3222a76d9d8695d54fefb4b7c53b7424decd88b57db61d6bf65e3369
SHA5120d7ed908a23ce09fd1d7eb1e953b70c6d9e51f9cc5a3f4921506096afec57b4017d0beb9092b3751ea82ca05dae76b804c9baebe7970242584f3918eb4090ea8
-
Filesize
639KB
MD54942e9c13479bc1a62bdb07b23474e3c
SHA1d7a7283939a2fa4506b47fa809431b9cc4d2559e
SHA2565b11f30be6e3bfb808c25d07b492cfa12840fd0efa795d8af397feba045d1c59
SHA5128c8edd299922fcfa100e3e725d1b09259a86e41546361273c386177a3e2a765ffc76169a5b9d142efb4c5335bee3805c1f908c7f4edae0f0a33f2631a037eb59
-
Filesize
92KB
MD5c97b20f1cc3a8ab3e76529906f8f388d
SHA1343c673821211d822fcedd194e960a5b11107867
SHA2566363ca8ceb755a223c5fc4b38a33a1259bcf7c8f1d4ac18a5eecaa88581a0184
SHA512470dee73a6869330dcd346c9d4dbdbb37b755f5094ca62b2e3c66af4afc0b7d8a1532cfbc8b74f376cb3ddcf839d1a1f9c2ae6270aac26ec654e94af0891ff42