Resubmissions
21-04-2024 23:00
240421-2y8ljacd95 10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 23:00
Behavioral task
behavioral1
Sample
ChappoSpoofer.exe
Resource
win7-20240220-en
General
-
Target
ChappoSpoofer.exe
-
Size
3.1MB
-
MD5
de96227eb0709f5bb30dde675b9e6dc4
-
SHA1
7f3aafdce9b7dd050630e801e8e5b76a95b5e336
-
SHA256
993278405cabf3bb46e69f5784dacc4ac68ed04b5af84de962e15af2b9561618
-
SHA512
a3b8df5efe2015bef35f7bdedc03b4c807e58241e057437d897bb1e3ca73e2fb46e68a65c8db3dfc24697851842677b0d88e58854d97345069e235fe3c68745e
-
SSDEEP
49152:fvClL26AaNeWgPhlmVqvMQ7XSKc6DiEQs2kCxSLoGGfTHHB72eh2NT7:fv6L26AaNeWgPhlmVqkQ7XSKc6Dec
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.137.178:4782
8d2015a7-d791-4873-bbd6-4c909ace97fb
-
encryption_key
078EC3386276E19F98076915A82DEE6A83AA8AFE
-
install_name
ChappoSpoofer.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1168-0-0x00000000000E0000-0x000000000040C000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\ChappoSpoofer.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
ChappoSpoofer.exepid process 3224 ChappoSpoofer.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4728 schtasks.exe 1556 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ChappoSpoofer.exeChappoSpoofer.exedescription pid process Token: SeDebugPrivilege 1168 ChappoSpoofer.exe Token: SeDebugPrivilege 3224 ChappoSpoofer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
ChappoSpoofer.exepid process 3224 ChappoSpoofer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
ChappoSpoofer.exepid process 3224 ChappoSpoofer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ChappoSpoofer.exepid process 3224 ChappoSpoofer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ChappoSpoofer.exeChappoSpoofer.exedescription pid process target process PID 1168 wrote to memory of 4728 1168 ChappoSpoofer.exe schtasks.exe PID 1168 wrote to memory of 4728 1168 ChappoSpoofer.exe schtasks.exe PID 1168 wrote to memory of 3224 1168 ChappoSpoofer.exe ChappoSpoofer.exe PID 1168 wrote to memory of 3224 1168 ChappoSpoofer.exe ChappoSpoofer.exe PID 3224 wrote to memory of 1556 3224 ChappoSpoofer.exe schtasks.exe PID 3224 wrote to memory of 1556 3224 ChappoSpoofer.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChappoSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\ChappoSpoofer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\ChappoSpoofer.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4728 -
C:\Users\Admin\AppData\Roaming\SubDir\ChappoSpoofer.exe"C:\Users\Admin\AppData\Roaming\SubDir\ChappoSpoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\ChappoSpoofer.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1556
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
3.1MB
MD5de96227eb0709f5bb30dde675b9e6dc4
SHA17f3aafdce9b7dd050630e801e8e5b76a95b5e336
SHA256993278405cabf3bb46e69f5784dacc4ac68ed04b5af84de962e15af2b9561618
SHA512a3b8df5efe2015bef35f7bdedc03b4c807e58241e057437d897bb1e3ca73e2fb46e68a65c8db3dfc24697851842677b0d88e58854d97345069e235fe3c68745e