Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 15:59
Behavioral task
behavioral1
Sample
Microsoft Gaming Helper.exe
Resource
win7-20231215-en
General
-
Target
Microsoft Gaming Helper.exe
-
Size
3.1MB
-
MD5
1f4df8c89189221420cd89ea0bdcf753
-
SHA1
30d7c89bd5d28870a5f6c25749ef2bb7b797de72
-
SHA256
b3573e1e395f30ce38648d8c9d5714ad35b0bcb93dbeabb1954e14b0199ca4d7
-
SHA512
4c7a66f7b5dff06328f6e737994e29dbec32931d9974c560d0867f67aef3a0c4f3a475f68d5299039bcde8528312611af18a654be34e6378a37d24e659be8ee1
-
SSDEEP
49152:3vbI22SsaNYfdPBldt698dBcjHwJRJ6/bR3LoGdJQ1THHB72eh2NT:3vk22SsaNYfdPBldt6+dBcjHwJRJ6RW
Malware Config
Extracted
quasar
1.4.1
Enayi
192.168.0.7:4782
cfb088c2-8243-4e30-af47-82a5b5bebf06
-
encryption_key
7AD862AAD94BE9C6EAA16CA4328915D7905AA3B4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/4000-0-0x0000000000B10000-0x0000000000E34000-memory.dmp family_quasar behavioral2/files/0x00070000000231e6-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4680 Client.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1768 schtasks.exe 4936 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4000 Microsoft Gaming Helper.exe Token: SeDebugPrivilege 4680 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4000 wrote to memory of 1768 4000 Microsoft Gaming Helper.exe 85 PID 4000 wrote to memory of 1768 4000 Microsoft Gaming Helper.exe 85 PID 4000 wrote to memory of 4680 4000 Microsoft Gaming Helper.exe 86 PID 4000 wrote to memory of 4680 4000 Microsoft Gaming Helper.exe 86 PID 4680 wrote to memory of 4936 4680 Client.exe 87 PID 4680 wrote to memory of 4936 4680 Client.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Gaming Helper.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Gaming Helper.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1768
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD51f4df8c89189221420cd89ea0bdcf753
SHA130d7c89bd5d28870a5f6c25749ef2bb7b797de72
SHA256b3573e1e395f30ce38648d8c9d5714ad35b0bcb93dbeabb1954e14b0199ca4d7
SHA5124c7a66f7b5dff06328f6e737994e29dbec32931d9974c560d0867f67aef3a0c4f3a475f68d5299039bcde8528312611af18a654be34e6378a37d24e659be8ee1