Analysis
-
max time kernel
138s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-02-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
91086ef2437049d4cfcb66149acf0d95.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
91086ef2437049d4cfcb66149acf0d95.exe
Resource
win10v2004-20231222-en
General
-
Target
91086ef2437049d4cfcb66149acf0d95.exe
-
Size
653KB
-
MD5
91086ef2437049d4cfcb66149acf0d95
-
SHA1
ac9cfed7ccfcd8676b437e753abdf7fc06981f71
-
SHA256
1c5bb8ac1735f400b18f16ed5daab07575ba4aaedb4da31ca5cd89205bb40141
-
SHA512
effe216b30c6371065d467e585f95db5106c35376a8fe430880a4e965c3a7927fb0453945036b19a6e0e7ec3d4a1290eee6e2445b68cd748086082da29db8046
-
SSDEEP
12288:bYBbFriWGl7gO03m4sRqJ2IOEEVR/7r+pKnoqsxWbvoyF3db6e0Rqs4J7S:MBxrd4lA7OvR/fqKoqsxsvoyFtbsqsJ
Malware Config
Extracted
quasar
2.1.0.0
Windows firewall
23.105.131.187:7812
VNM_MUTEX_zGeT5SjdI1pYgFyiav
-
encryption_key
3kpwI2tkVNrXY2Mm5wlR
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
Windows Firewall Updates
Signatures
-
Contains code to disable Windows Defender 5 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/memory/2664-8-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2664-9-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2664-12-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2664-15-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/2664-17-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def -
Processes:
91086ef2437049d4cfcb66149acf0d95.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 91086ef2437049d4cfcb66149acf0d95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 91086ef2437049d4cfcb66149acf0d95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 91086ef2437049d4cfcb66149acf0d95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 91086ef2437049d4cfcb66149acf0d95.exe -
Quasar payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2664-8-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2664-9-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2664-12-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2664-15-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/2664-17-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
Processes:
Windows Security.exeWindows Security.exepid Process 2740 Windows Security.exe 2968 Windows Security.exe -
Loads dropped DLL 2 IoCs
Processes:
91086ef2437049d4cfcb66149acf0d95.exeWindows Security.exepid Process 2664 91086ef2437049d4cfcb66149acf0d95.exe 2740 Windows Security.exe -
Processes:
91086ef2437049d4cfcb66149acf0d95.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 91086ef2437049d4cfcb66149acf0d95.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 91086ef2437049d4cfcb66149acf0d95.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
91086ef2437049d4cfcb66149acf0d95.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\QwXMCzbSAJ = "C:\\Users\\Admin\\AppData\\Roaming\\jXMDeSqECF\\tEWMqGdDFT.exe" 91086ef2437049d4cfcb66149acf0d95.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
91086ef2437049d4cfcb66149acf0d95.exeWindows Security.exedescription pid Process procid_target PID 3000 set thread context of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 2740 set thread context of 2968 2740 Windows Security.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 2116 schtasks.exe 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exe91086ef2437049d4cfcb66149acf0d95.exepid Process 2572 powershell.exe 2664 91086ef2437049d4cfcb66149acf0d95.exe 2664 91086ef2437049d4cfcb66149acf0d95.exe 2664 91086ef2437049d4cfcb66149acf0d95.exe 2664 91086ef2437049d4cfcb66149acf0d95.exe 2664 91086ef2437049d4cfcb66149acf0d95.exe 2664 91086ef2437049d4cfcb66149acf0d95.exe 2664 91086ef2437049d4cfcb66149acf0d95.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
91086ef2437049d4cfcb66149acf0d95.exeWindows Security.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2664 91086ef2437049d4cfcb66149acf0d95.exe Token: SeDebugPrivilege 2968 Windows Security.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2968 Windows Security.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Security.exepid Process 2968 Windows Security.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
91086ef2437049d4cfcb66149acf0d95.exe91086ef2437049d4cfcb66149acf0d95.exeWindows Security.exeWindows Security.execmd.exedescription pid Process procid_target PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 3000 wrote to memory of 2664 3000 91086ef2437049d4cfcb66149acf0d95.exe 28 PID 2664 wrote to memory of 2828 2664 91086ef2437049d4cfcb66149acf0d95.exe 30 PID 2664 wrote to memory of 2828 2664 91086ef2437049d4cfcb66149acf0d95.exe 30 PID 2664 wrote to memory of 2828 2664 91086ef2437049d4cfcb66149acf0d95.exe 30 PID 2664 wrote to memory of 2828 2664 91086ef2437049d4cfcb66149acf0d95.exe 30 PID 2664 wrote to memory of 2740 2664 91086ef2437049d4cfcb66149acf0d95.exe 32 PID 2664 wrote to memory of 2740 2664 91086ef2437049d4cfcb66149acf0d95.exe 32 PID 2664 wrote to memory of 2740 2664 91086ef2437049d4cfcb66149acf0d95.exe 32 PID 2664 wrote to memory of 2740 2664 91086ef2437049d4cfcb66149acf0d95.exe 32 PID 2664 wrote to memory of 2572 2664 91086ef2437049d4cfcb66149acf0d95.exe 33 PID 2664 wrote to memory of 2572 2664 91086ef2437049d4cfcb66149acf0d95.exe 33 PID 2664 wrote to memory of 2572 2664 91086ef2437049d4cfcb66149acf0d95.exe 33 PID 2664 wrote to memory of 2572 2664 91086ef2437049d4cfcb66149acf0d95.exe 33 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2740 wrote to memory of 2968 2740 Windows Security.exe 35 PID 2968 wrote to memory of 2116 2968 Windows Security.exe 36 PID 2968 wrote to memory of 2116 2968 Windows Security.exe 36 PID 2968 wrote to memory of 2116 2968 Windows Security.exe 36 PID 2968 wrote to memory of 2116 2968 Windows Security.exe 36 PID 2664 wrote to memory of 2668 2664 91086ef2437049d4cfcb66149acf0d95.exe 38 PID 2664 wrote to memory of 2668 2664 91086ef2437049d4cfcb66149acf0d95.exe 38 PID 2664 wrote to memory of 2668 2664 91086ef2437049d4cfcb66149acf0d95.exe 38 PID 2664 wrote to memory of 2668 2664 91086ef2437049d4cfcb66149acf0d95.exe 38 PID 2668 wrote to memory of 2448 2668 cmd.exe 40 PID 2668 wrote to memory of 2448 2668 cmd.exe 40 PID 2668 wrote to memory of 2448 2668 cmd.exe 40 PID 2668 wrote to memory of 2448 2668 cmd.exe 40 PID 2664 wrote to memory of 2088 2664 91086ef2437049d4cfcb66149acf0d95.exe 41 PID 2664 wrote to memory of 2088 2664 91086ef2437049d4cfcb66149acf0d95.exe 41 PID 2664 wrote to memory of 2088 2664 91086ef2437049d4cfcb66149acf0d95.exe 41 PID 2664 wrote to memory of 2088 2664 91086ef2437049d4cfcb66149acf0d95.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\91086ef2437049d4cfcb66149acf0d95.exe"C:\Users\Admin\AppData\Local\Temp\91086ef2437049d4cfcb66149acf0d95.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\91086ef2437049d4cfcb66149acf0d95.exe"C:\Users\Admin\AppData\Local\Temp\91086ef2437049d4cfcb66149acf0d95.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\91086ef2437049d4cfcb66149acf0d95.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2828
-
-
C:\Users\Admin\AppData\Roaming\Windows Firewall Updates\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Firewall Updates\Windows Security.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Roaming\Windows Firewall Updates\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Windows Firewall Updates\Windows Security.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Firewall Updates\Windows Security.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:2116
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\dw95VFNQE48Q.bat" "3⤵PID:2088
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
229B
MD5c82815a3889b177969c53b7cabaa8b0a
SHA1a335da405c5f2be89cbd68ac3bc6b14c56512a09
SHA256ab9d2e01b7bde16741d03a9134a9ab9b89eab07ddd7244f21e33f52be2ab239f
SHA5125367735a091d6ac25005fbcbd8f054ccf3d300ddd478d00cc0f639a4c5c4d2a0b14c9562c6ee7d527f787892679a84895ca22285354a8fc1c6d84c9c71bdb956
-
Filesize
653KB
MD591086ef2437049d4cfcb66149acf0d95
SHA1ac9cfed7ccfcd8676b437e753abdf7fc06981f71
SHA2561c5bb8ac1735f400b18f16ed5daab07575ba4aaedb4da31ca5cd89205bb40141
SHA512effe216b30c6371065d467e585f95db5106c35376a8fe430880a4e965c3a7927fb0453945036b19a6e0e7ec3d4a1290eee6e2445b68cd748086082da29db8046