Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-03-2024 21:06
Static task
static1
Behavioral task
behavioral1
Sample
Malware.bat
Resource
win7-20240215-en
General
-
Target
Malware.bat
-
Size
5.1MB
-
MD5
9a7d8e4dd1ba4265ef75c22265b9fbb8
-
SHA1
fcd5b59e6ed52b1e2efeb3e68c7c4bc3f93945d5
-
SHA256
a155e28e5517fc85bf006ee991a1aab8f595a0aaeb05b0ee4fd38cdbc8f6ca52
-
SHA512
ee1c93dbb18f40e589b1914dd416dc0f96b9279b71e3f048eccaba5efad7430a72178fa87234ac70757099628c33a27f234ad7f3cd3854de3fd6d59c67d17fd6
-
SSDEEP
24576:SpcksZhAsxYu9bEUt4Qa1CFQa5Z4tp5ljbjvGr2BBgfretKRxMp+hrQB0eJM2a8d:MSbESV0MFJnCjsYvVxxx
Malware Config
Extracted
quasar
1.4.1
Slave
140.238.91.110:36039
df49f69a-66a2-4b6e-bb60-18c12b5b14df
-
encryption_key
6A1671418BB270D703D501AB8E9B41E8D413B6D3
-
install_name
Client.exe
-
log_directory
Win64ErrorLogs
-
reconnect_delay
3000
-
startup_key
Windows Boot Menu
-
subdirectory
SubDir
Signatures
-
Quasar payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\x.exe family_quasar behavioral1/memory/2656-62218-0x0000000001320000-0x0000000001644000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar behavioral1/memory/2796-62228-0x0000000000840000-0x0000000000B64000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
Processes:
x.exeClient.exepid process 2656 x.exe 2796 Client.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2128 schtasks.exe 2696 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
x.exeClient.exedescription pid process Token: SeDebugPrivilege 2656 x.exe Token: SeDebugPrivilege 2796 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 2796 Client.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
cmd.exex.exeClient.exedescription pid process target process PID 2620 wrote to memory of 2724 2620 cmd.exe findstr.exe PID 2620 wrote to memory of 2724 2620 cmd.exe findstr.exe PID 2620 wrote to memory of 2724 2620 cmd.exe findstr.exe PID 2620 wrote to memory of 1656 2620 cmd.exe cscript.exe PID 2620 wrote to memory of 1656 2620 cmd.exe cscript.exe PID 2620 wrote to memory of 1656 2620 cmd.exe cscript.exe PID 2620 wrote to memory of 2656 2620 cmd.exe x.exe PID 2620 wrote to memory of 2656 2620 cmd.exe x.exe PID 2620 wrote to memory of 2656 2620 cmd.exe x.exe PID 2656 wrote to memory of 2128 2656 x.exe schtasks.exe PID 2656 wrote to memory of 2128 2656 x.exe schtasks.exe PID 2656 wrote to memory of 2128 2656 x.exe schtasks.exe PID 2656 wrote to memory of 2796 2656 x.exe Client.exe PID 2656 wrote to memory of 2796 2656 x.exe Client.exe PID 2656 wrote to memory of 2796 2656 x.exe Client.exe PID 2796 wrote to memory of 2696 2796 Client.exe schtasks.exe PID 2796 wrote to memory of 2696 2796 Client.exe schtasks.exe PID 2796 wrote to memory of 2696 2796 Client.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Malware.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\findstr.exefindstr /e "'v" "C:\Users\Admin\AppData\Local\Temp\Malware.bat"2⤵
-
C:\Windows\system32\cscript.execscript //nologo C:\Users\Admin\AppData\Local\Temp\x.vbs2⤵
-
C:\Users\Admin\AppData\Local\Temp\x.exeC:\Users\Admin\AppData\Local\Temp\x.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Boot Menu" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Boot Menu" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\xFilesize
1KB
MD5887da7a91254c6b048aeee103349e4ad
SHA1c7a3c3aa6004ac68186e4517e2290691238c6a82
SHA2565faec935fb44a8dcd721616eb77d6e4c04fb2ee2eac9ec95eb5c260ba024e758
SHA5121a6f79339892a5660930e2131ddd413d2d3430aaa9034cfbbc53ea8a872797e510f3f84a52b5149851ed7e67dc0b1273e78824023313889397902cc234d48e7b
-
C:\Users\Admin\AppData\Local\Temp\xFilesize
4KB
MD5455a61cc4a314ee0a161afeeb892127a
SHA139cd3580251ba1ea61ca235cf34b906d6cd06a10
SHA2565e1ce5ab4179522e60cfdf3e10b2740bd2dd634ec05701218f6000ee407ab269
SHA512e5c6197beef87942b5ea5b9afb71751a9a8ce5efedb5b59f6b778de856454cd9a83ffbdfe94bbd2c7b8ac8391514dd0b10b5b08c7bda37bf961885b88e1693d2
-
C:\Users\Admin\AppData\Local\Temp\xFilesize
4.3MB
MD58f5db2a9a611c27329ceb18fe4be4b7c
SHA19ebde9eeb11fdd7abbff994b2e618fb5788b195a
SHA256ed7bb1b3674576e85aade62061e5b7f92815a40cd794d5c1695b41c38f7ac418
SHA51221160048814f77862f9024246e9e9e039e0ff97a2e4c2848c8ed148f76ed57490f0ea0c60a0fd9a6b697737960de845ce5e83454608de02a4a1d5d6e34052449
-
C:\Users\Admin\AppData\Local\Temp\xFilesize
1KB
MD5d5108ed7cecef1fff3f24d80a9f21a44
SHA1d36cd08f4377b52f76db5c79dddf2b053f17503d
SHA2561d7ab3e26d52dd5059113b1a7455645562abed46658ad602e9d1f5bbee20a26c
SHA512605271ebc302c62ec6846fb02cbf6187a9a2f0b724bd01c70433a6f131a7086d4fd45ea7ba7c1522de87842afdbe784006f1ba9cbd72c43317c91c3b248184f6
-
C:\Users\Admin\AppData\Local\Temp\x.exeFilesize
3.1MB
MD5561d2b135a6200ef094b222eb47af87a
SHA14db2f2254cae3695a0ffa7ccdc13097db254cd8c
SHA256c458feb66832df6a0c361d951c60bcda34c4f5c82652d25c5e4a1aa4c41d8d94
SHA5126bd32a9099968b13150a16ee919684e319a67a55dc436fb36157901528e5ccf0283daecdafd07876186f00af13a3bba170a6328926156578a2c06455772b0094
-
C:\Users\Admin\AppData\Local\Temp\x.vbsFilesize
380B
MD5ec9a2fb69a379d913a4e0a953cd3b97c
SHA1a0303ed9f787c042071a1286bba43a5bbdd0679e
SHA256cf8268d158bb819ef158ff6ccbed64d5e379148a0adb1f73a082a01d56d0286b
SHA512fef8e24a680991046bd7dacd6079c7e48c3031fe46caae722ea93797ee16c052073ba97959e992ea71ac7ab72fbcedaa5cf4a410657aac4c10ad24de6935e9d6
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
1.9MB
MD5747a68f6cef67f1d32e2c8bd1a104c76
SHA1d147744f083d8d3313edc2d8ced15da47e9063ef
SHA25659bb040d456946901ae7d0840b37d743f81eddf5aaa57a66e50b3df0b66aae10
SHA51291ad965e0ffbdba42781c651e3de4a76e17913f629e4468ab238c1dfd7c2bcbfc532a3705dc1d923aa48acd4c60023d0d54df85fbf1bc3b25f805309cf53599b
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
2.3MB
MD53fbd2a79e95b10f865e478a05354f4af
SHA17b3dcc1689b528b7c1755372fdf22235ff5f3de4
SHA25620872dd4464c6f5b55a8ecac6426ec8cc99e169586279f2f301e70ac3b0e9729
SHA512ec54aad88cfb9910b0019086f7af4228a19f43cc2a491ffce089a74eaafc6870a4aad53850fe1f92c09d27d1906009144d8f01567916969e8a616d0ab3fd3c26
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
2.0MB
MD5a21cd9591853e3ccdd66285b46e49272
SHA1d599a0b40cfb25169a6ebc4364d19e210f17532b
SHA256fd031c87b239241400d41ed5d018f84573fff600918f0cd4efc1c753ef65002c
SHA51210e293bf9f700df3a60da549e8113ac16ad4fdf12bbbbad0178a3167806a9cf09801ab560e9a70c1aa411dd9d7f6ce1e3b7c1fdbaa414c2f2bfe1f4bf5732c01
-
memory/2656-62220-0x000000001B1A0000-0x000000001B220000-memory.dmpFilesize
512KB
-
memory/2656-62219-0x000007FEF5B40000-0x000007FEF652C000-memory.dmpFilesize
9.9MB
-
memory/2656-62227-0x000007FEF5B40000-0x000007FEF652C000-memory.dmpFilesize
9.9MB
-
memory/2656-62218-0x0000000001320000-0x0000000001644000-memory.dmpFilesize
3.1MB
-
memory/2796-62226-0x000007FEF5B40000-0x000007FEF652C000-memory.dmpFilesize
9.9MB
-
memory/2796-62228-0x0000000000840000-0x0000000000B64000-memory.dmpFilesize
3.1MB
-
memory/2796-62229-0x000000001B320000-0x000000001B3A0000-memory.dmpFilesize
512KB
-
memory/2796-62230-0x000007FEF5B40000-0x000007FEF652C000-memory.dmpFilesize
9.9MB
-
memory/2796-62231-0x000000001B320000-0x000000001B3A0000-memory.dmpFilesize
512KB