Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
Pogingenc.exe
Resource
win7-20240221-en
General
-
Target
Pogingenc.exe
-
Size
6.0MB
-
MD5
4d05ea664b21ab95e888f456afa1a7a8
-
SHA1
b4ddeb5b9c83cd8ff02004f52751d1298212a37c
-
SHA256
0ad767569575baeeba2c76169fe9389b805364dd3a71e5e8d818dea5a94acc50
-
SHA512
05825d447257267ab9079f15f31565dc7bf88dc6293ccf9ca93bee67a63ef1a68ee29b5a54d33336a4864e326b90239fc34b13831e1243b1390a96f5214aad20
-
SSDEEP
98304:aBDvEtGdg2pgJTJSCYLCWcpc2tlbWvKUeR+T8u0:aBDt9gJTXYGWcRtlivOA
Malware Config
Extracted
quasar
1.4.1
Office04
93.123.85.108:4782
e14b8f59-979b-4ebf-8602-dd3c4d6c301e
-
encryption_key
534734397C0FA9A1D28F061AD75DF4100BFF5787
-
install_name
Msconfig.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 5 IoCs
resource yara_rule behavioral1/memory/2724-14-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2724-12-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2724-10-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2724-9-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2724-16-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 2344 mstools.exe 928 mstools.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2932 set thread context of 2724 2932 Pogingenc.exe 28 PID 2344 set thread context of 2784 2344 mstools.exe 40 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe 2488 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2724 vbc.exe Token: SeDebugPrivilege 2784 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2724 vbc.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2724 2932 Pogingenc.exe 28 PID 2932 wrote to memory of 2720 2932 Pogingenc.exe 29 PID 2932 wrote to memory of 2720 2932 Pogingenc.exe 29 PID 2932 wrote to memory of 2720 2932 Pogingenc.exe 29 PID 2932 wrote to memory of 2720 2932 Pogingenc.exe 29 PID 2932 wrote to memory of 2740 2932 Pogingenc.exe 31 PID 2932 wrote to memory of 2740 2932 Pogingenc.exe 31 PID 2932 wrote to memory of 2740 2932 Pogingenc.exe 31 PID 2932 wrote to memory of 2740 2932 Pogingenc.exe 31 PID 2740 wrote to memory of 2488 2740 cmd.exe 33 PID 2740 wrote to memory of 2488 2740 cmd.exe 33 PID 2740 wrote to memory of 2488 2740 cmd.exe 33 PID 2740 wrote to memory of 2488 2740 cmd.exe 33 PID 2932 wrote to memory of 2476 2932 Pogingenc.exe 34 PID 2932 wrote to memory of 2476 2932 Pogingenc.exe 34 PID 2932 wrote to memory of 2476 2932 Pogingenc.exe 34 PID 2932 wrote to memory of 2476 2932 Pogingenc.exe 34 PID 2692 wrote to memory of 2344 2692 taskeng.exe 39 PID 2692 wrote to memory of 2344 2692 taskeng.exe 39 PID 2692 wrote to memory of 2344 2692 taskeng.exe 39 PID 2692 wrote to memory of 2344 2692 taskeng.exe 39 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 2784 2344 mstools.exe 40 PID 2344 wrote to memory of 1668 2344 mstools.exe 41 PID 2344 wrote to memory of 1668 2344 mstools.exe 41 PID 2344 wrote to memory of 1668 2344 mstools.exe 41 PID 2344 wrote to memory of 1668 2344 mstools.exe 41 PID 2344 wrote to memory of 1256 2344 mstools.exe 43 PID 2344 wrote to memory of 1256 2344 mstools.exe 43 PID 2344 wrote to memory of 1256 2344 mstools.exe 43 PID 2344 wrote to memory of 1256 2344 mstools.exe 43 PID 1256 wrote to memory of 1800 1256 cmd.exe 45 PID 1256 wrote to memory of 1800 1256 cmd.exe 45 PID 1256 wrote to memory of 1800 1256 cmd.exe 45 PID 1256 wrote to memory of 1800 1256 cmd.exe 45 PID 2344 wrote to memory of 1732 2344 mstools.exe 46 PID 2344 wrote to memory of 1732 2344 mstools.exe 46 PID 2344 wrote to memory of 1732 2344 mstools.exe 46 PID 2344 wrote to memory of 1732 2344 mstools.exe 46 PID 2692 wrote to memory of 928 2692 taskeng.exe 48 PID 2692 wrote to memory of 928 2692 taskeng.exe 48 PID 2692 wrote to memory of 928 2692 taskeng.exe 48 PID 2692 wrote to memory of 928 2692 taskeng.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pogingenc.exe"C:\Users\Admin\AppData\Local\Temp\Pogingenc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\mstools"2⤵PID:2720
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe'" /f3⤵
- Creates scheduled task(s)
PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Pogingenc.exe" "C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe"2⤵PID:2476
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {776116C9-9C41-49B8-A913-7850802DE16E} S-1-5-21-2297530677-1229052932-2803917579-1000:HKULBIBU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exeC:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\mstools"3⤵PID:1668
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe'" /f4⤵
- Creates scheduled task(s)
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe" "C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe"3⤵PID:1732
-
-
-
C:\Users\Admin\AppData\Local\Temp\mstools\mstools.exeC:\Users\Admin\AppData\Local\Temp\mstools\mstools.exe2⤵
- Executes dropped EXE
PID:928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD54d05ea664b21ab95e888f456afa1a7a8
SHA1b4ddeb5b9c83cd8ff02004f52751d1298212a37c
SHA2560ad767569575baeeba2c76169fe9389b805364dd3a71e5e8d818dea5a94acc50
SHA51205825d447257267ab9079f15f31565dc7bf88dc6293ccf9ca93bee67a63ef1a68ee29b5a54d33336a4864e326b90239fc34b13831e1243b1390a96f5214aad20