Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
e51e1e4a21fef3fd98784683d80b5a02.exe
Resource
win7-20240221-en
General
-
Target
e51e1e4a21fef3fd98784683d80b5a02.exe
-
Size
1.0MB
-
MD5
e51e1e4a21fef3fd98784683d80b5a02
-
SHA1
309790387ec94c189ef94803a87fab335159657a
-
SHA256
aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7
-
SHA512
329922a8229f6e07f549e8919b4f6e1d60bf7d153b30487c8dde0116d8b31745f88d3f7bf20616d2a88276e8d2c24859e73440a03d4d2ecc08cd207678d84265
-
SSDEEP
24576:A1QNv9uN9fFNd6AtvbGN/BCfKEPmxKVnRNWg:A1WluN9fZvbGyKFxg
Malware Config
Extracted
quasar
1.3.0.0
PVP2
clausetestbits.chickenkiller.com:64598
snoetestbits.ignorelist.com:64598
QSR_MUTEX_ttz0i8tcYpqYyKkP3l
-
encryption_key
kxBjTYBAXsyGYsjsYZcL
-
install_name
mcr.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
mcs
-
subdirectory
mcr
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2252-9-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Executes dropped EXE 3 IoCs
pid Process 5112 mcr.exe 3968 mcr.exe 452 mcr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 ip-api.com -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4004 set thread context of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 set thread context of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 5112 set thread context of 3968 5112 mcr.exe 103 PID 5112 set thread context of 452 5112 mcr.exe 104 -
Program crash 2 IoCs
pid pid_target Process procid_target 3792 4828 WerFault.exe 92 4732 452 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4328 schtasks.exe 548 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4004 e51e1e4a21fef3fd98784683d80b5a02.exe Token: SeDebugPrivilege 2252 e51e1e4a21fef3fd98784683d80b5a02.exe Token: SeDebugPrivilege 5112 mcr.exe Token: SeDebugPrivilege 3968 mcr.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 2252 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 91 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 4004 wrote to memory of 4828 4004 e51e1e4a21fef3fd98784683d80b5a02.exe 92 PID 2252 wrote to memory of 548 2252 e51e1e4a21fef3fd98784683d80b5a02.exe 97 PID 2252 wrote to memory of 548 2252 e51e1e4a21fef3fd98784683d80b5a02.exe 97 PID 2252 wrote to memory of 548 2252 e51e1e4a21fef3fd98784683d80b5a02.exe 97 PID 2252 wrote to memory of 5112 2252 e51e1e4a21fef3fd98784683d80b5a02.exe 101 PID 2252 wrote to memory of 5112 2252 e51e1e4a21fef3fd98784683d80b5a02.exe 101 PID 2252 wrote to memory of 5112 2252 e51e1e4a21fef3fd98784683d80b5a02.exe 101 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 3968 5112 mcr.exe 103 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 5112 wrote to memory of 452 5112 mcr.exe 104 PID 3968 wrote to memory of 4328 3968 mcr.exe 108 PID 3968 wrote to memory of 4328 3968 mcr.exe 108 PID 3968 wrote to memory of 4328 3968 mcr.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\e51e1e4a21fef3fd98784683d80b5a02.exe"C:\Users\Admin\AppData\Local\Temp\e51e1e4a21fef3fd98784683d80b5a02.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\e51e1e4a21fef3fd98784683d80b5a02.exeC:\Users\Admin\AppData\Local\Temp\e51e1e4a21fef3fd98784683d80b5a02.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "mcs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\e51e1e4a21fef3fd98784683d80b5a02.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:548
-
-
C:\Users\Admin\AppData\Roaming\mcr\mcr.exe"C:\Users\Admin\AppData\Roaming\mcr\mcr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Roaming\mcr\mcr.exeC:\Users\Admin\AppData\Roaming\mcr\mcr.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "mcs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\mcr\mcr.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:4328
-
-
-
C:\Users\Admin\AppData\Roaming\mcr\mcr.exeC:\Users\Admin\AppData\Roaming\mcr\mcr.exe4⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 805⤵
- Program crash
PID:4732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e51e1e4a21fef3fd98784683d80b5a02.exeC:\Users\Admin\AppData\Local\Temp\e51e1e4a21fef3fd98784683d80b5a02.exe2⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 803⤵
- Program crash
PID:3792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4828 -ip 48281⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 452 -ip 4521⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e51e1e4a21fef3fd98784683d80b5a02.exe.log
Filesize706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
448KB
MD5389fadc4ec9a4a65c060a63417f11f80
SHA1f5df45a010e8376de2122ad69b534afc8277bd9b
SHA25682367d8cf6caca8e792fb13fd51bc4ee26137459ecaa655ed7e1aa464b3d9bf1
SHA512e1dadbc2d382859b3f26124e5d8cb8d1dcd057bc0d7a46fd795b5e7efeafafbc72bd2a20ab3698d52e93845590d4b27b5bce291edb745e781d119d3313570d03
-
Filesize
1.0MB
MD5e51e1e4a21fef3fd98784683d80b5a02
SHA1309790387ec94c189ef94803a87fab335159657a
SHA256aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7
SHA512329922a8229f6e07f549e8919b4f6e1d60bf7d153b30487c8dde0116d8b31745f88d3f7bf20616d2a88276e8d2c24859e73440a03d4d2ecc08cd207678d84265