Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-02-2024 04:37
Behavioral task
behavioral1
Sample
359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe
Resource
win7-20231215-en
General
-
Target
359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe
-
Size
3.1MB
-
MD5
df415a94b93536e36060b33baa82546d
-
SHA1
08cfa785b11927a3053de2eb3ba9c17b313fca82
-
SHA256
359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1
-
SHA512
698547aedf83338f1880a8c1ce65c1913cf77f089a6b41473dc62e585884357a63e0711550ae7dbba98a1719cce3a6424be50d6e15305a73fe5b26544d957654
-
SSDEEP
49152:mvVt62XlaSFNWPjljiFa2RoUYIrT76+zoG6HXu4THHB72eh2NT:mvn62XlaSFNWPjljiFXRoUYIrT76Y
Malware Config
Extracted
quasar
1.4.1
Office01
31.220.97.187:443
0505375d-d956-4c5c-b735-c942a92b89cb
-
encryption_key
535E12CCD94BDC2CFFD2A9CFF6D5C3251B8CDAE3
-
install_name
winboot.exe
-
log_directory
Logs
-
reconnect_delay
5000
-
startup_key
UEFI boot
-
subdirectory
bootufi
Signatures
-
Quasar payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2132-0-0x0000000000270000-0x0000000000594000-memory.dmp family_quasar C:\Windows\System32\bootufi\winboot.exe family_quasar C:\Windows\system32\bootufi\winboot.exe family_quasar behavioral1/memory/2668-8-0x0000000001390000-0x00000000016B4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
Processes:
winboot.exepid process 2668 winboot.exe -
Drops file in System32 directory 5 IoCs
Processes:
359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exewinboot.exedescription ioc process File created C:\Windows\system32\bootufi\winboot.exe 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe File opened for modification C:\Windows\system32\bootufi\winboot.exe 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe File opened for modification C:\Windows\system32\bootufi 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe File opened for modification C:\Windows\system32\bootufi\winboot.exe winboot.exe File opened for modification C:\Windows\system32\bootufi winboot.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2656 schtasks.exe 2716 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exewinboot.exedescription pid process Token: SeDebugPrivilege 2132 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe Token: SeDebugPrivilege 2668 winboot.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exewinboot.exedescription pid process target process PID 2132 wrote to memory of 2656 2132 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe schtasks.exe PID 2132 wrote to memory of 2656 2132 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe schtasks.exe PID 2132 wrote to memory of 2656 2132 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe schtasks.exe PID 2132 wrote to memory of 2668 2132 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe winboot.exe PID 2132 wrote to memory of 2668 2132 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe winboot.exe PID 2132 wrote to memory of 2668 2132 359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe winboot.exe PID 2668 wrote to memory of 2716 2668 winboot.exe schtasks.exe PID 2668 wrote to memory of 2716 2668 winboot.exe schtasks.exe PID 2668 wrote to memory of 2716 2668 winboot.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe"C:\Users\Admin\AppData\Local\Temp\359367716a543f967e551c97ec94a6bf4c1e7e08cf5c6c0b91aa4e046d44f4d1.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "UEFI boot" /sc ONLOGON /tr "C:\Windows\system32\bootufi\winboot.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\bootufi\winboot.exe"C:\Windows\system32\bootufi\winboot.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "UEFI boot" /sc ONLOGON /tr "C:\Windows\system32\bootufi\winboot.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System32\bootufi\winboot.exeFilesize
2.1MB
MD51abc0053c1f09fc6f4e9d4e29cc0e4fd
SHA1c85b3bd4d4e8b67569c264311fcc1fc64709f43e
SHA256b5c0dae9bc4b0dab360ba365864e87296c9d9d8346fd048dde35a71846d572fc
SHA512e2a414616872d9a1afdd116b5c556ec68f8d0d99c3897b4316099d7ab94962395b19f644f5ddcc6019abc4c71da977760a1c01e626bd3946fc1c0cd2e580121a
-
C:\Windows\system32\bootufi\winboot.exeFilesize
1.4MB
MD502e50a3e6e6b0b6fab8fd5f8a6d798a7
SHA1d338aa06322ed36d4d22010fce3e278a21d351a1
SHA2562f8b22c9f5fc253e2251bed446115c5f87302ae7f72fd913a0b40b625c3b7258
SHA512f9dbcf6d9adc5fd19a9572929a50797a573c0b1dc797baa4e8cf2d7902d25738bd55927b8768249ea8becf56716919047e5076edeba8d03418780a15b2b18328
-
memory/2132-0-0x0000000000270000-0x0000000000594000-memory.dmpFilesize
3.1MB
-
memory/2132-1-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmpFilesize
9.9MB
-
memory/2132-2-0x000000001B1B0000-0x000000001B230000-memory.dmpFilesize
512KB
-
memory/2132-10-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmpFilesize
9.9MB
-
memory/2668-9-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmpFilesize
9.9MB
-
memory/2668-11-0x0000000000A70000-0x0000000000AF0000-memory.dmpFilesize
512KB
-
memory/2668-8-0x0000000001390000-0x00000000016B4000-memory.dmpFilesize
3.1MB
-
memory/2668-12-0x000007FEF5FB0000-0x000007FEF699C000-memory.dmpFilesize
9.9MB
-
memory/2668-13-0x0000000000A70000-0x0000000000AF0000-memory.dmpFilesize
512KB