Analysis
-
max time kernel
148s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 18:53
Behavioral task
behavioral1
Sample
4ef1927705d28faf8456c200397d0af6.exe
Resource
win7-20231215-en
General
-
Target
4ef1927705d28faf8456c200397d0af6.exe
-
Size
792KB
-
MD5
4ef1927705d28faf8456c200397d0af6
-
SHA1
b92ab805e7c2884abcf371179b0d8989c4f90025
-
SHA256
cd5a8de963a29d07bb003a8d03fa7ba38e5004641fe8138885c967db46bef0fc
-
SHA512
fe7f2405a8beb2bd70cfc689ce5ea3fc2cc4e03c72c925db698ea0e56b269b3e66c20f88afc382ea734e39b25cf66b0bcf24d72dab12d1b791ef91c690af17ac
-
SSDEEP
6144:K8fGABIgrx8kFYLTiMkbmM28mA04ykdBbDqIJluHLmRZXqavbvmGaGy3V8/GV0j1:LPx7FYPiMq2fkdZ9JamPaaDvreg7
Malware Config
Extracted
quasar
2.1.0.0
Office04
192.168.1.154:4782
VNM_MUTEX_ph9lkMeWS6xgznetvP
-
encryption_key
2ABr09PX2FCCobHek8sv
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 3 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/2068-1-0x00000000008D0000-0x000000000099C000-memory.dmp disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def C:\Users\Admin\AppData\Roaming\SubDir\Client.exe disable_win_def -
Processes:
4ef1927705d28faf8456c200397d0af6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4ef1927705d28faf8456c200397d0af6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4ef1927705d28faf8456c200397d0af6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4ef1927705d28faf8456c200397d0af6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4ef1927705d28faf8456c200397d0af6.exe -
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2068-1-0x00000000008D0000-0x000000000099C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4ef1927705d28faf8456c200397d0af6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 4ef1927705d28faf8456c200397d0af6.exe -
Executes dropped EXE 1 IoCs
Processes:
Client.exepid process 4800 Client.exe -
Processes:
4ef1927705d28faf8456c200397d0af6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4ef1927705d28faf8456c200397d0af6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4ef1927705d28faf8456c200397d0af6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1916 schtasks.exe 224 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
powershell.exe4ef1927705d28faf8456c200397d0af6.exe4ef1927705d28faf8456c200397d0af6.exepid process 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 2068 4ef1927705d28faf8456c200397d0af6.exe 3944 4ef1927705d28faf8456c200397d0af6.exe 3944 4ef1927705d28faf8456c200397d0af6.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
4ef1927705d28faf8456c200397d0af6.exepowershell.exeClient.exe4ef1927705d28faf8456c200397d0af6.exedescription pid process Token: SeDebugPrivilege 2068 4ef1927705d28faf8456c200397d0af6.exe Token: SeDebugPrivilege 4804 powershell.exe Token: SeDebugPrivilege 4800 Client.exe Token: SeDebugPrivilege 4800 Client.exe Token: SeDebugPrivilege 3944 4ef1927705d28faf8456c200397d0af6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 4800 Client.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
4ef1927705d28faf8456c200397d0af6.exeClient.execmd.execmd.exedescription pid process target process PID 2068 wrote to memory of 1916 2068 4ef1927705d28faf8456c200397d0af6.exe schtasks.exe PID 2068 wrote to memory of 1916 2068 4ef1927705d28faf8456c200397d0af6.exe schtasks.exe PID 2068 wrote to memory of 1916 2068 4ef1927705d28faf8456c200397d0af6.exe schtasks.exe PID 2068 wrote to memory of 4800 2068 4ef1927705d28faf8456c200397d0af6.exe Client.exe PID 2068 wrote to memory of 4800 2068 4ef1927705d28faf8456c200397d0af6.exe Client.exe PID 2068 wrote to memory of 4800 2068 4ef1927705d28faf8456c200397d0af6.exe Client.exe PID 2068 wrote to memory of 4804 2068 4ef1927705d28faf8456c200397d0af6.exe powershell.exe PID 2068 wrote to memory of 4804 2068 4ef1927705d28faf8456c200397d0af6.exe powershell.exe PID 2068 wrote to memory of 4804 2068 4ef1927705d28faf8456c200397d0af6.exe powershell.exe PID 4800 wrote to memory of 224 4800 Client.exe schtasks.exe PID 4800 wrote to memory of 224 4800 Client.exe schtasks.exe PID 4800 wrote to memory of 224 4800 Client.exe schtasks.exe PID 2068 wrote to memory of 1204 2068 4ef1927705d28faf8456c200397d0af6.exe cmd.exe PID 2068 wrote to memory of 1204 2068 4ef1927705d28faf8456c200397d0af6.exe cmd.exe PID 2068 wrote to memory of 1204 2068 4ef1927705d28faf8456c200397d0af6.exe cmd.exe PID 1204 wrote to memory of 2460 1204 cmd.exe cmd.exe PID 1204 wrote to memory of 2460 1204 cmd.exe cmd.exe PID 1204 wrote to memory of 2460 1204 cmd.exe cmd.exe PID 2068 wrote to memory of 3560 2068 4ef1927705d28faf8456c200397d0af6.exe cmd.exe PID 2068 wrote to memory of 3560 2068 4ef1927705d28faf8456c200397d0af6.exe cmd.exe PID 2068 wrote to memory of 3560 2068 4ef1927705d28faf8456c200397d0af6.exe cmd.exe PID 3560 wrote to memory of 2232 3560 cmd.exe chcp.com PID 3560 wrote to memory of 2232 3560 cmd.exe chcp.com PID 3560 wrote to memory of 2232 3560 cmd.exe chcp.com PID 3560 wrote to memory of 3988 3560 cmd.exe PING.EXE PID 3560 wrote to memory of 3988 3560 cmd.exe PING.EXE PID 3560 wrote to memory of 3988 3560 cmd.exe PING.EXE PID 3560 wrote to memory of 3944 3560 cmd.exe 4ef1927705d28faf8456c200397d0af6.exe PID 3560 wrote to memory of 3944 3560 cmd.exe 4ef1927705d28faf8456c200397d0af6.exe PID 3560 wrote to memory of 3944 3560 cmd.exe 4ef1927705d28faf8456c200397d0af6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef1927705d28faf8456c200397d0af6.exe"C:\Users\Admin\AppData\Local\Temp\4ef1927705d28faf8456c200397d0af6.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\4ef1927705d28faf8456c200397d0af6.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1916
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:224
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TlIea1i3zqmj.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2232
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\4ef1927705d28faf8456c200397d0af6.exe"C:\Users\Admin\AppData\Local\Temp\4ef1927705d28faf8456c200397d0af6.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4ef1927705d28faf8456c200397d0af6.exe.log
Filesize1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
229B
MD519c459d65488ec49c7c4d274ca367d0f
SHA154b368182867049a5728390f9552c24e93589f91
SHA256742d7bd46ea59f96002a7be15badd02d0919d537696741074c0d355a4b1ea4c6
SHA512f49e6d84cf85baa9e447dfe3837e5b567e1b785665fbfd2ef69b315ce0d16c7cef5e5b7cdb6a7066dee16600db7a01bd00934655bad9a9728b98c173654b1aa2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
792KB
MD54ef1927705d28faf8456c200397d0af6
SHA1b92ab805e7c2884abcf371179b0d8989c4f90025
SHA256cd5a8de963a29d07bb003a8d03fa7ba38e5004641fe8138885c967db46bef0fc
SHA512fe7f2405a8beb2bd70cfc689ce5ea3fc2cc4e03c72c925db698ea0e56b269b3e66c20f88afc382ea734e39b25cf66b0bcf24d72dab12d1b791ef91c690af17ac
-
Filesize
667KB
MD56a10889832a6917cf9baa6b14df3de90
SHA1db36d84e1a4f5b16ecfc32eff70cc01ee93775d4
SHA256662e74eb9261bc074fab192fc0a6a3db27ef9a88ea8dae318b9d463d18781d30
SHA512bba62a5d1e5bc3b65eea4117c7ad6073b7b381bddec4bb0b08444d4ae6e368fa517028f88ab5e66276be293a900a62da7ec348d61164bc32c9c71f418e102c43