Overview
overview
10Static
static
3ItroublveT...SC.exe
windows7-x64
10ItroublveT...SC.exe
windows10-2004-x64
10ItroublveT...rv.exe
windows7-x64
10ItroublveT...rv.exe
windows10-2004-x64
9ItroublveT...ram.js
windows7-x64
1ItroublveT...ram.js
windows10-2004-x64
1ItroublveT...er.vbs
windows7-x64
1ItroublveT...er.vbs
windows10-2004-x64
1ItroublveT...es.vbs
windows7-x64
1ItroublveT...es.vbs
windows10-2004-x64
1ItroublveT...LI.exe
windows7-x64
1ItroublveT...LI.exe
windows10-2004-x64
1ItroublveT...re.dll
windows7-x64
1ItroublveT...re.dll
windows10-2004-x64
1ItroublveT...er.dll
windows7-x64
1ItroublveT...er.dll
windows10-2004-x64
1ItroublveT...ns.dll
windows7-x64
1ItroublveT...ns.dll
windows10-2004-x64
1ItroublveT...er.dll
windows7-x64
1ItroublveT...er.dll
windows10-2004-x64
1ItroublveT...me.dll
windows7-x64
1ItroublveT...me.dll
windows10-2004-x64
ItroublveT...en.dll
windows7-x64
1ItroublveT...en.dll
windows10-2004-x64
1ItroublveT...ib.dll
windows7-x64
1ItroublveT...ib.dll
windows10-2004-x64
1ItroublveT...le.dll
windows7-x64
1ItroublveT...le.dll
windows10-2004-x64
1ItroublveT...le.dll
windows7-x64
1ItroublveT...le.dll
windows10-2004-x64
1ItroublveT...le.dll
windows7-x64
1ItroublveT...le.dll
windows10-2004-x64
1Analysis
-
max time kernel
49s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
ItroublveTSC-master/ItroublveTSC.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ItroublveTSC-master/ItroublveTSC.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ItroublveTSC-master/bin/Binaries/RtkBtManServ.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
ItroublveTSC-master/bin/Binaries/RtkBtManServ.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
ItroublveTSC-master/bin/Program.js
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ItroublveTSC-master/bin/Program.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
ItroublveTSC-master/bin/Properties/Resources.Designer.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
ItroublveTSC-master/bin/Properties/Resources.Designer.vbs
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
ItroublveTSC-master/bin/Properties/Resources.vbs
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
ItroublveTSC-master/bin/Properties/Resources.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
ItroublveTSC-master/bin/obf/CLI.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
ItroublveTSC-master/bin/obf/CLI.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
ItroublveTSC-master/bin/obf/Confuser.Core.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
ItroublveTSC-master/bin/obf/Confuser.Core.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
ItroublveTSC-master/bin/obf/Confuser.DynCipher.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ItroublveTSC-master/bin/obf/Confuser.DynCipher.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
ItroublveTSC-master/bin/obf/Confuser.Protections.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
ItroublveTSC-master/bin/obf/Confuser.Protections.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
ItroublveTSC-master/bin/obf/Confuser.Renamer.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
ItroublveTSC-master/bin/obf/Confuser.Renamer.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
ItroublveTSC-master/bin/obf/Confuser.Runtime.dll
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
ItroublveTSC-master/bin/obf/Confuser.Runtime.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
ItroublveTSC-master/bin/obf/Teen.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ItroublveTSC-master/bin/obf/Teen.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
ItroublveTSC-master/bin/obf/dnlib.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
ItroublveTSC-master/bin/obf/dnlib.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
ItroublveTSC-master/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/net46/System.IO.Compression.ZipFile.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
ItroublveTSC-master/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/net46/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
ItroublveTSC-master/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/netstandard1.3/System.IO.Compression.ZipFile.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
ItroublveTSC-master/bin/packages/System.IO.Compression.ZipFile.4.3.0/lib/netstandard1.3/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
ItroublveTSC-master/bin/packages/System.IO.Compression.ZipFile.4.3.0/ref/net46/System.IO.Compression.ZipFile.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
ItroublveTSC-master/bin/packages/System.IO.Compression.ZipFile.4.3.0/ref/net46/System.IO.Compression.ZipFile.dll
Resource
win10v2004-20240412-en
General
-
Target
ItroublveTSC-master/ItroublveTSC.exe
-
Size
2.0MB
-
MD5
7c2da2ae36228b8b66ec5e5029e90d08
-
SHA1
d636baf89fd305a1f694611097ac6e7bcb1f244c
-
SHA256
c6820f426b28b93295ca3b768780e8b372424fb72e94b5d0c094b030f53d4721
-
SHA512
93cbc698211b0ab0f96ab3f0eb8d393bcd04580418e08fc6df9b935a7cdd091b619a0edab4771b4c887264b0eef6846e6e08a7be24a8681848a1885206a29960
-
SSDEEP
49152:DL+qgtiXBVLcHD/QmJqRsVEzCeePMAnUD:OzcBVYHDjcyVMukAUD
Malware Config
Extracted
quasar
2.1.0.0
Office04
zaidtheboii-50153.portmap.host:50153
VNM_MUTEX_fNWmZ9wa8oprRXUo73
-
encryption_key
PJRTtGrfOi1c09c0GCYT
-
install_name
OneDrive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft One Drive
-
subdirectory
Microsoft One Drive
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x00070000000232bc-18.dat disable_win_def behavioral2/memory/1288-29-0x00000000009B0000-0x0000000000A40000-memory.dmp disable_win_def -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Microsoft OneDrive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Microsoft OneDrive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Microsoft OneDrive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Microsoft OneDrive.exe -
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000232bc-18.dat family_quasar behavioral2/memory/1288-29-0x00000000009B0000-0x0000000000A40000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ItroublveTSC.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation OneDrive.exe -
Executes dropped EXE 3 IoCs
pid Process 1968 ItroublveTSC.exe 1288 Microsoft OneDrive.exe 1124 OneDrive.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Microsoft OneDrive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Microsoft OneDrive.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe Microsoft OneDrive.exe File opened for modification C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe Microsoft OneDrive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2588 1124 WerFault.exe 101 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2976 schtasks.exe 2364 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4396 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3900 powershell.exe 3900 powershell.exe 3900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1288 Microsoft OneDrive.exe Token: SeDebugPrivilege 1968 ItroublveTSC.exe Token: SeDebugPrivilege 3900 powershell.exe Token: SeDebugPrivilege 1124 OneDrive.exe Token: SeDebugPrivilege 1124 OneDrive.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 ItroublveTSC.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1968 ItroublveTSC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1124 OneDrive.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1968 1640 ItroublveTSC.exe 92 PID 1640 wrote to memory of 1968 1640 ItroublveTSC.exe 92 PID 1640 wrote to memory of 1968 1640 ItroublveTSC.exe 92 PID 1640 wrote to memory of 1288 1640 ItroublveTSC.exe 93 PID 1640 wrote to memory of 1288 1640 ItroublveTSC.exe 93 PID 1640 wrote to memory of 1288 1640 ItroublveTSC.exe 93 PID 1288 wrote to memory of 2976 1288 Microsoft OneDrive.exe 99 PID 1288 wrote to memory of 2976 1288 Microsoft OneDrive.exe 99 PID 1288 wrote to memory of 2976 1288 Microsoft OneDrive.exe 99 PID 1288 wrote to memory of 1124 1288 Microsoft OneDrive.exe 101 PID 1288 wrote to memory of 1124 1288 Microsoft OneDrive.exe 101 PID 1288 wrote to memory of 1124 1288 Microsoft OneDrive.exe 101 PID 1288 wrote to memory of 3900 1288 Microsoft OneDrive.exe 102 PID 1288 wrote to memory of 3900 1288 Microsoft OneDrive.exe 102 PID 1288 wrote to memory of 3900 1288 Microsoft OneDrive.exe 102 PID 1124 wrote to memory of 2364 1124 OneDrive.exe 105 PID 1124 wrote to memory of 2364 1124 OneDrive.exe 105 PID 1124 wrote to memory of 2364 1124 OneDrive.exe 105 PID 1124 wrote to memory of 2312 1124 OneDrive.exe 107 PID 1124 wrote to memory of 2312 1124 OneDrive.exe 107 PID 1124 wrote to memory of 2312 1124 OneDrive.exe 107 PID 2312 wrote to memory of 3604 2312 cmd.exe 111 PID 2312 wrote to memory of 3604 2312 cmd.exe 111 PID 2312 wrote to memory of 3604 2312 cmd.exe 111 PID 2312 wrote to memory of 4396 2312 cmd.exe 112 PID 2312 wrote to memory of 4396 2312 cmd.exe 112 PID 2312 wrote to memory of 4396 2312 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\ItroublveTSC-master\ItroublveTSC.exe"C:\Users\Admin\AppData\Local\Temp\ItroublveTSC-master\ItroublveTSC.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\ItroublveTSC.exe"C:\Users\Admin\AppData\Roaming\ItroublveTSC.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft One Drive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2976
-
-
C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe"C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft One Drive" /sc ONLOGON /tr "C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:2364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ukSOxfHfvfca.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3604
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:4396
-
-
C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe"C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe"5⤵PID:820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 22244⤵
- Program crash
PID:2588
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1124 -ip 11241⤵PID:3992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3740 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:3424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD53fce051fde9fbd1302b4ee16f604553b
SHA1e137d2e6fa0007ddd0bf3a1215a68b37ef2ed653
SHA256a34954a87d0f4354a21e40ea0e9a9eee4420f47987d40be854ea7b98d6d36226
SHA512cb07f753043b7705b0e32bbf4e1ae8ddf6176851562dea567e75a4715b1beb4031d35a43b6bf0bc45d5b2da7430be0d87b6ae61b5b2e07c7c8950bb0247e4a5c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
211B
MD53c24028fa1618b79540164803865ea10
SHA10d49f78d599b6ad10d1fb668dcc98e4b8bcf3044
SHA256c0e0aab3c504f5212c69008f91d07c2dc3eed5a774689710257a10eb0032af3f
SHA5121b2d38d73dcf8cc03db8b2f37222ffa764d98c3351cdfcc33bbffc3b2eeef4f3d1c971f9a9222425cc3ff49730b39a0e5c16baca7b05fe8146f80c31dd44a8e9
-
Filesize
3.9MB
MD553f43b1e9d99d6a356a332d9073b4736
SHA171e6c5a216a66b2b523b1b022d44c10b276c6195
SHA256584bf67e7c8e93629e175733fe42907e60916047e68f1b4973d4cbf3dd2c22d6
SHA512e7c5e4b26309e38dd1dd52b4f509c94fb9f50453e4d5c2ba895b02c48457a15c384866fdeb57185b628f10873ed6a6e6936ad170827f4855c9c5eca15ab8f959