Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
TEST.bat
Resource
win7-20240221-en
General
-
Target
TEST.bat
-
Size
5.1MB
-
MD5
b86f4f6866f58f646d089796996d129c
-
SHA1
a95b2a3ad0457286ef23353b9592755fe276671d
-
SHA256
f4ac97b8dd5a438a715a43b6c2e7d3431f1a2c3e17cf8bc8858027b0f544e354
-
SHA512
7e5cb1bea9974bfc6da599514aa549cf5fffcf82a37bac15259d5f0b4d8f99dd2b2703db9cbb773b861e2c68fc5a0cf31e6a685fa0b4a9d979b6661aa69cb1ae
-
SSDEEP
24576:gccksZhAsxYu9bEUt4Qa1CFQa5Z4tp5ljbjvGr2BBgfretKRxMp+hrQB0eJM2a8x:9SbESV0MFJnhVFHVwseHFIR4l1t
Malware Config
Extracted
quasar
1.4.1
Slave
140.238.91.110:36305
f4720af1-0ef3-414f-b170-e837e2727049
-
encryption_key
52EF528D690A6F47ED9D8BD4A80E69CBE28EDC0A
-
install_name
Windows.exe
-
log_directory
Windows Error Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\x.exe family_quasar C:\Users\Admin\AppData\Local\Temp\x.exe family_quasar behavioral2/memory/4512-62218-0x0000000000DC0000-0x00000000010E4000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Windows.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Windows.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Windows.exe family_quasar -
Executes dropped EXE 2 IoCs
Processes:
x.exeWindows.exepid process 4512 x.exe 4084 Windows.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 692 schtasks.exe 3740 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
x.exeWindows.exedescription pid process Token: SeDebugPrivilege 4512 x.exe Token: SeDebugPrivilege 4084 Windows.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows.exepid process 4084 Windows.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exex.exeWindows.exedescription pid process target process PID 1440 wrote to memory of 4108 1440 cmd.exe findstr.exe PID 1440 wrote to memory of 4108 1440 cmd.exe findstr.exe PID 1440 wrote to memory of 3784 1440 cmd.exe cscript.exe PID 1440 wrote to memory of 3784 1440 cmd.exe cscript.exe PID 1440 wrote to memory of 4512 1440 cmd.exe x.exe PID 1440 wrote to memory of 4512 1440 cmd.exe x.exe PID 4512 wrote to memory of 692 4512 x.exe schtasks.exe PID 4512 wrote to memory of 692 4512 x.exe schtasks.exe PID 4512 wrote to memory of 4084 4512 x.exe Windows.exe PID 4512 wrote to memory of 4084 4512 x.exe Windows.exe PID 4084 wrote to memory of 3740 4084 Windows.exe schtasks.exe PID 4084 wrote to memory of 3740 4084 Windows.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\TEST.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\findstr.exefindstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\TEST.bat"2⤵
-
C:\Windows\system32\cscript.execscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs2⤵
-
C:\Users\Admin\AppData\Local\Temp\x.exeC:\Users\Admin\AppData\Local\Temp\x.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\xFilesize
4KB
MD524760012903e1275d49f1ae18d49a095
SHA18f418184131cd00f71cd05f0653ff1acfa0ae2e1
SHA2569091c7c912ccc3cba3b4da3e4ead57af25f2a74670252578908d1031540c0b97
SHA51214f4e2898d01ccb2dbb1c4c69868fc4c018657902b1e487cde8455dc4e47cf9226ce5a2730fe90123d82bace0bf5260c053ebdb8e7a9fe437ee0b80002a55941
-
C:\Users\Admin\AppData\Local\Temp\xFilesize
4.3MB
MD586d323e5f0c8cc803bce65d0ba99864e
SHA131ac2d2b336faf9aa911c0371c668923169679ee
SHA2567c7981c2284f87649282657837c62e812b4a156e88ac2922479e2a24fa223afa
SHA51224fd1b30b2a7b2e251b6b3283c1becd5a1e2e69b22c780fc034551d5ceb42a88b138237efa565977e265d101eef756bc69972d52552cd1530e34612dee6fc8d1
-
C:\Users\Admin\AppData\Local\Temp\x.exeFilesize
121KB
MD5de3343e17a8d04e4f6e12e2031b2276f
SHA1c3364e602197448647b0b37c089cb22533dd24c3
SHA25648d8f2dc481465124542c16dae2ab68c2d033f6966c4f5ce8b365254ab887cda
SHA512f081d1c07ad606a449b72a2edb9dcd4107ddec141ee0bf507030c1cf69d82553607302060c279cbf2440fece412f09d5f078a7ce9a0ebb9e3e226f70e58e1d3d
-
C:\Users\Admin\AppData\Local\Temp\x.exeFilesize
256KB
MD5462956a2495defd5a719c3d3b6fecd0b
SHA130f84ed230390c2d2933af393d948de32135c7d1
SHA256087e7d94b6fa9dec965ee22c77ab83f063f911a2a89f99d15094e03d60dc4d3b
SHA512b59cf018a8d83f6ec7fa640b94ea8d0e8ae107b9b30b686b7a6ea4fc457e62bc6381a5ed72e78626f3cd9ff55f15bed20935c189788f4ee715ec510052dfa45e
-
C:\Users\Admin\AppData\Local\Temp\x.vbsFilesize
380B
MD5ec9a2fb69a379d913a4e0a953cd3b97c
SHA1a0303ed9f787c042071a1286bba43a5bbdd0679e
SHA256cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b
SHA512fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows.exeFilesize
768KB
MD509ab8b4f1b150d600f98a038b1021aad
SHA12fd618f4dc2df66942f2300a852662f78979dbe5
SHA256e025a24499dee5dc28ef873c869729cd5115393cae063a78a80f69b5ba07caf6
SHA512931bf78e671fde8a7dfe777fb46e53b1c65333594aa2f1a8ae9125c9f180eaae838816fc9e409ff72cae7deb626b0f2b711e1233c861148f94775f797b136755
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows.exeFilesize
1.1MB
MD520b34a25583c69cd8346c9dfe856721a
SHA1682dc6bd8a97e9e7cf904c2ad47e703aac6be7f7
SHA2561040104360c7cfd5114ea4b82d7f83bc797e711574a116d33328edc22c5d673c
SHA5127cc0f416d2086ef218ab20a9d7d21c2ea71768356a694340036f29ab0a5b1820c27bc5f1d743e19664cd713be5a76e387b671126d56531b5c920435aad734c87
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows.exeFilesize
1.5MB
MD50b0cc8b722e1f73b32b082308f349530
SHA19f451aa2e70f22ca98f8c64833a58b6b4dada0a6
SHA2567d0ed5e09ed7dd7bdfcd7ba639d4c58c816842f65f85a12e16d2cbfb5f6d3019
SHA5125c01dc3658b8f0b0d71835d535442bebfe9b158b1d4d0479c747b65df19930705e243cf31d6822d3dae64403cadc52209c6073acb2f48f6ce1a33ffab11c7b68
-
memory/4084-62227-0x00007FFD8FE20000-0x00007FFD908E1000-memory.dmpFilesize
10.8MB
-
memory/4084-62229-0x000000001B9C0000-0x000000001B9D0000-memory.dmpFilesize
64KB
-
memory/4084-62230-0x000000001C110000-0x000000001C160000-memory.dmpFilesize
320KB
-
memory/4084-62231-0x000000001C220000-0x000000001C2D2000-memory.dmpFilesize
712KB
-
memory/4084-62232-0x00007FFD8FE20000-0x00007FFD908E1000-memory.dmpFilesize
10.8MB
-
memory/4084-62233-0x000000001B9C0000-0x000000001B9D0000-memory.dmpFilesize
64KB
-
memory/4512-62219-0x00007FFD8FE20000-0x00007FFD908E1000-memory.dmpFilesize
10.8MB
-
memory/4512-62220-0x000000001BEB0000-0x000000001BEC0000-memory.dmpFilesize
64KB
-
memory/4512-62218-0x0000000000DC0000-0x00000000010E4000-memory.dmpFilesize
3.1MB
-
memory/4512-62228-0x00007FFD8FE20000-0x00007FFD908E1000-memory.dmpFilesize
10.8MB