Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe
Resource
win7-20240221-en
General
-
Target
aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe
-
Size
1.0MB
-
MD5
e51e1e4a21fef3fd98784683d80b5a02
-
SHA1
309790387ec94c189ef94803a87fab335159657a
-
SHA256
aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7
-
SHA512
329922a8229f6e07f549e8919b4f6e1d60bf7d153b30487c8dde0116d8b31745f88d3f7bf20616d2a88276e8d2c24859e73440a03d4d2ecc08cd207678d84265
-
SSDEEP
24576:A1QNv9uN9fFNd6AtvbGN/BCfKEPmxKVnRNWg:A1WluN9fZvbGyKFxg
Malware Config
Extracted
quasar
1.3.0.0
PVP2
clausetestbits.chickenkiller.com:64598
snoetestbits.ignorelist.com:64598
QSR_MUTEX_ttz0i8tcYpqYyKkP3l
-
encryption_key
kxBjTYBAXsyGYsjsYZcL
-
install_name
mcr.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
mcs
-
subdirectory
mcr
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4108-9-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule behavioral2/memory/4108-9-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables containing common artifacts observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/4108-9-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer -
Detects executables packed with ConfuserEx Mod 6 IoCs
resource yara_rule behavioral2/memory/1120-1-0x00000000005E0000-0x00000000006EA000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral2/memory/1120-4-0x000000000DC60000-0x000000000DD78000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral2/files/0x001200000002313f-26.dat INDICATOR_EXE_Packed_ConfuserEx behavioral2/files/0x001200000002313f-25.dat INDICATOR_EXE_Packed_ConfuserEx behavioral2/files/0x001200000002313f-33.dat INDICATOR_EXE_Packed_ConfuserEx behavioral2/files/0x001200000002313f-31.dat INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 3 IoCs
pid Process 1216 mcr.exe 4504 mcr.exe 2072 mcr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1120 set thread context of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 set thread context of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1216 set thread context of 4504 1216 mcr.exe 100 PID 1216 set thread context of 2072 1216 mcr.exe 101 -
Program crash 1 IoCs
pid pid_target Process procid_target 4464 2072 WerFault.exe 101 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4932 schtasks.exe 3008 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe Token: SeDebugPrivilege 1456 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe Token: SeDebugPrivilege 1216 mcr.exe Token: SeDebugPrivilege 4504 mcr.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 4108 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 94 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1120 wrote to memory of 1456 1120 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 95 PID 1456 wrote to memory of 4932 1456 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 97 PID 1456 wrote to memory of 4932 1456 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 97 PID 1456 wrote to memory of 4932 1456 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 97 PID 1456 wrote to memory of 1216 1456 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 99 PID 1456 wrote to memory of 1216 1456 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 99 PID 1456 wrote to memory of 1216 1456 aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe 99 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 4504 1216 mcr.exe 100 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 1216 wrote to memory of 2072 1216 mcr.exe 101 PID 4504 wrote to memory of 3008 4504 mcr.exe 107 PID 4504 wrote to memory of 3008 4504 mcr.exe 107 PID 4504 wrote to memory of 3008 4504 mcr.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe"C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exeC:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe2⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exeC:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "mcs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4932
-
-
C:\Users\Admin\AppData\Roaming\mcr\mcr.exe"C:\Users\Admin\AppData\Roaming\mcr\mcr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Roaming\mcr\mcr.exeC:\Users\Admin\AppData\Roaming\mcr\mcr.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "mcs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\mcr\mcr.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:3008
-
-
-
C:\Users\Admin\AppData\Roaming\mcr\mcr.exeC:\Users\Admin\AppData\Roaming\mcr\mcr.exe4⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 805⤵
- Program crash
PID:4464
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2072 -ip 20721⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe.log
Filesize706B
MD5d95c58e609838928f0f49837cab7dfd2
SHA155e7139a1e3899195b92ed8771d1ca2c7d53c916
SHA2560407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339
SHA512405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d
-
Filesize
344KB
MD59b4441a09e3af86426c8edd6842e59ff
SHA18043a1fe7bff2a65a56b04c1270566b89f2065b8
SHA2569fd16b9eb0e8a775925d8e80f6b5773e4557cf4cf77d09902d27086597384cf4
SHA512ed56cd6739d404c4d3312278506a890287c176f4b12796dfd930d8f66d3fbea1ffe1fc6784bcbd6272ac19074cd56ce0dc1fd9c84815f408d72f0c394fc89720
-
Filesize
271KB
MD516d7628160da1f6c92bc18a0365a9559
SHA1afa864763a1bfbb06d83b645c54f84ea91afc255
SHA256972d7a947eac13d67163757cd464ea53e308d99dd052159f7920fc4bcea54fa4
SHA5125df6f8bd852bba2a48cad86dba869eb4b5be15aacc317c878fe6f1d9c258e8b150bd6fee2dea514ae7262e2457ede03c00a600bab12250bd6252a2fbc21afedd
-
Filesize
149KB
MD5ae68df297e84e76c6be760cb5804e05a
SHA12c12ddee70e4565cf7d213931dee66ce36373a58
SHA256a21b63c9f8e07abc863fecf0618e92f87b24923f910d060a73314e8255a84e2c
SHA512abea03dab47b2c49151053016cb34d72a011cb1de7638bcd26febf110464f7672f4498b55e12194e497265f46ad061488d16e069ea14aa2ae56619d5f9063c9b
-
Filesize
128KB
MD5df03308dc61a9e55cb422bfeeaef824a
SHA15a4118506e028207a07144bec309753aecec0917
SHA256b5357ee001faee42f2cb9e9307959a1ad0bf7dc3cd2344e2d9ed789724f31160
SHA512b60a244dc11cd8de6e5fdf4814f2591d0bfc51f9522ee3da614b9d7c739d1335a50f6a0c8c777d416eb9ce8a5c3b9a388c4eecc69dd779d04a661e9777735b5c