Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 16:48
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
1a042eb9d21238cd93f8c04f4713d9ec
-
SHA1
bee49a94d392843f6cec2b0f81b56c0c652c3579
-
SHA256
68a11c9b5380f4651ca2c7246a43d6fa905711357c773605aefb7f7ee6e6edc8
-
SHA512
7dda1d567a1624d0a66b2fa4b5c31a3f350fce2e590683f52a4a8c2a38e871bb20cbe47fca6c1c76667be25dd7da5375503c8d5a0863417f0c419e82d3b87b79
-
SSDEEP
49152:OvEt62XlaSFNWPjljiFa2RoUYIgcFrqMfnZoGdxHTHHB72eh2NT:OvY62XlaSFNWPjljiFXRoUYIgcFr7B
Malware Config
Extracted
quasar
1.4.1
cheat
192.168.178.23:4782
272551ab-8052-4b4e-a889-aadb9092e72c
-
encryption_key
2257EEB177515C16042E47AEB0207ADB4DD194BF
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/228-0-0x0000000000880000-0x0000000000BA4000-memory.dmp family_quasar C:\Windows\System32\SubDir\Client.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
Client.exepid process 1672 Client.exe -
Drops file in System32 directory 2 IoCs
Processes:
Client-built.exedescription ioc process File created C:\Windows\system32\SubDir\Client.exe Client-built.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4732 schtasks.exe 1988 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Client-built.exeClient.exedescription pid process Token: SeDebugPrivilege 228 Client-built.exe Token: SeDebugPrivilege 1672 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Client.exepid process 1672 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Client.exepid process 1672 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Client-built.exeClient.exedescription pid process target process PID 228 wrote to memory of 4732 228 Client-built.exe schtasks.exe PID 228 wrote to memory of 4732 228 Client-built.exe schtasks.exe PID 228 wrote to memory of 1672 228 Client-built.exe Client.exe PID 228 wrote to memory of 1672 228 Client-built.exe Client.exe PID 1672 wrote to memory of 1988 1672 Client.exe schtasks.exe PID 1672 wrote to memory of 1988 1672 Client.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System32\SubDir\Client.exeFilesize
3.1MB
MD51a042eb9d21238cd93f8c04f4713d9ec
SHA1bee49a94d392843f6cec2b0f81b56c0c652c3579
SHA25668a11c9b5380f4651ca2c7246a43d6fa905711357c773605aefb7f7ee6e6edc8
SHA5127dda1d567a1624d0a66b2fa4b5c31a3f350fce2e590683f52a4a8c2a38e871bb20cbe47fca6c1c76667be25dd7da5375503c8d5a0863417f0c419e82d3b87b79
-
memory/228-0-0x0000000000880000-0x0000000000BA4000-memory.dmpFilesize
3.1MB
-
memory/228-1-0x00007FFE2D560000-0x00007FFE2E021000-memory.dmpFilesize
10.8MB
-
memory/228-2-0x0000000002C30000-0x0000000002C40000-memory.dmpFilesize
64KB
-
memory/228-9-0x00007FFE2D560000-0x00007FFE2E021000-memory.dmpFilesize
10.8MB
-
memory/1672-8-0x00007FFE2D560000-0x00007FFE2E021000-memory.dmpFilesize
10.8MB
-
memory/1672-10-0x000000001BB10000-0x000000001BB20000-memory.dmpFilesize
64KB
-
memory/1672-11-0x000000001C6E0000-0x000000001C730000-memory.dmpFilesize
320KB
-
memory/1672-12-0x000000001C7F0000-0x000000001C8A2000-memory.dmpFilesize
712KB
-
memory/1672-13-0x00007FFE2D560000-0x00007FFE2E021000-memory.dmpFilesize
10.8MB