Analysis
-
max time kernel
39s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 05:10
General
-
Target
ArgonOSINT.exe
-
Size
409KB
-
MD5
c4f70954d48c8653fde31fc63c619fc8
-
SHA1
c2fe0bc4eab66f6cbf19ab3a80817eba8084982e
-
SHA256
dbc30b002dad39a45fdd36c509d854dc931662235886f01ec149cd8cf904ddb5
-
SHA512
1a0db425192d25f1e96ac43a5ae18ff530ef11e2f1526fd6677f4b82b04e212679c347f5647be0d72665e2f587c2824b19d2104c48546eb049ae27fb7470defc
-
SSDEEP
12288:UpyJcC+x6AoV5l+6KprKF/UV6u4W0pDs:kwd+mDsV6u4g
Malware Config
Extracted
quasar
3.1.5
Slave
even-lemon.gl.at.ply.gg:33587
$Sxr-3vDee7FzoJnhqjuE3n
-
encryption_key
BfQu2aop09VkjugTkmuc
-
install_name
$sxr-powershell.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
$sxr-powershell
-
subdirectory
Windows
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4900-1-0x0000000000470000-0x00000000004DC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exe family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
$sxr-powershell.exe$sxr-powershell.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation $sxr-powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
$sxr-powershell.exe$sxr-powershell.exepid process 2020 $sxr-powershell.exe 5072 $sxr-powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com 11 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeSCHTASKS.exeschtasks.exeschtasks.exepid process 4908 schtasks.exe 1832 SCHTASKS.exe 2420 schtasks.exe 3324 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
taskmgr.exepid process 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
ArgonOSINT.exetaskmgr.exe$sxr-powershell.exe$sxr-powershell.exedescription pid process Token: SeDebugPrivilege 4900 ArgonOSINT.exe Token: SeDebugPrivilege 448 taskmgr.exe Token: SeSystemProfilePrivilege 448 taskmgr.exe Token: SeCreateGlobalPrivilege 448 taskmgr.exe Token: SeDebugPrivilege 2020 $sxr-powershell.exe Token: SeDebugPrivilege 5072 $sxr-powershell.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
Processes:
taskmgr.exepid process 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
taskmgr.exepid process 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe 448 taskmgr.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
ArgonOSINT.exe$sxr-powershell.execmd.exe$sxr-powershell.execmd.exedescription pid process target process PID 4900 wrote to memory of 4908 4900 ArgonOSINT.exe schtasks.exe PID 4900 wrote to memory of 4908 4900 ArgonOSINT.exe schtasks.exe PID 4900 wrote to memory of 4908 4900 ArgonOSINT.exe schtasks.exe PID 4900 wrote to memory of 2020 4900 ArgonOSINT.exe $sxr-powershell.exe PID 4900 wrote to memory of 2020 4900 ArgonOSINT.exe $sxr-powershell.exe PID 4900 wrote to memory of 2020 4900 ArgonOSINT.exe $sxr-powershell.exe PID 4900 wrote to memory of 1832 4900 ArgonOSINT.exe SCHTASKS.exe PID 4900 wrote to memory of 1832 4900 ArgonOSINT.exe SCHTASKS.exe PID 4900 wrote to memory of 1832 4900 ArgonOSINT.exe SCHTASKS.exe PID 2020 wrote to memory of 2420 2020 $sxr-powershell.exe schtasks.exe PID 2020 wrote to memory of 2420 2020 $sxr-powershell.exe schtasks.exe PID 2020 wrote to memory of 2420 2020 $sxr-powershell.exe schtasks.exe PID 2020 wrote to memory of 4276 2020 $sxr-powershell.exe cmd.exe PID 2020 wrote to memory of 4276 2020 $sxr-powershell.exe cmd.exe PID 2020 wrote to memory of 4276 2020 $sxr-powershell.exe cmd.exe PID 4276 wrote to memory of 1572 4276 cmd.exe chcp.com PID 4276 wrote to memory of 1572 4276 cmd.exe chcp.com PID 4276 wrote to memory of 1572 4276 cmd.exe chcp.com PID 4276 wrote to memory of 4436 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 4436 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 4436 4276 cmd.exe PING.EXE PID 4276 wrote to memory of 5072 4276 cmd.exe $sxr-powershell.exe PID 4276 wrote to memory of 5072 4276 cmd.exe $sxr-powershell.exe PID 4276 wrote to memory of 5072 4276 cmd.exe $sxr-powershell.exe PID 5072 wrote to memory of 3324 5072 $sxr-powershell.exe schtasks.exe PID 5072 wrote to memory of 3324 5072 $sxr-powershell.exe schtasks.exe PID 5072 wrote to memory of 3324 5072 $sxr-powershell.exe schtasks.exe PID 5072 wrote to memory of 4612 5072 $sxr-powershell.exe cmd.exe PID 5072 wrote to memory of 4612 5072 $sxr-powershell.exe cmd.exe PID 5072 wrote to memory of 4612 5072 $sxr-powershell.exe cmd.exe PID 4612 wrote to memory of 5092 4612 cmd.exe chcp.com PID 4612 wrote to memory of 5092 4612 cmd.exe chcp.com PID 4612 wrote to memory of 5092 4612 cmd.exe chcp.com PID 4612 wrote to memory of 396 4612 cmd.exe PING.EXE PID 4612 wrote to memory of 396 4612 cmd.exe PING.EXE PID 4612 wrote to memory of 396 4612 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArgonOSINT.exe"C:\Users\Admin\AppData\Local\Temp\ArgonOSINT.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\ArgonOSINT.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YDcHpYbtowEk.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "$sxr-powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dveCQIQTAyDq.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77ArgonOSINT.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\ArgonOSINT.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\$sxr-powershell.exe.logFilesize
1KB
MD58013ca45a4b68a281377f2c7b517ac8a
SHA1aff79b7c8f408e5ae6f00cf9d83e2fd95d9affc3
SHA256234381ea204c431d0936c4141a38381629938e4f5d40dd0ef01de6a282abbae7
SHA512428305df713c12d2165303a9b0433c83a0e3f3088a9551deb6403e9351814c38c2377e7c22ede57bcd23ca764e02fce431c52aba6bf4b998b89a518129fda2d6
-
C:\Users\Admin\AppData\Local\Temp\YDcHpYbtowEk.batFilesize
217B
MD50208e6dff30ca940adb424746cddd27b
SHA1a8fa94cbcfbd35187f18eb6e1535d0a7d477e54c
SHA256c6094641e8430a83779fe951bcb69f063ed1bac59f504604fd04387f9e151e6f
SHA51268b71a7a89a9e20d22491a287eefc81ee29e8e8fcb748d5b22e0394fbc4f1451f4082fa68c12b35eab2f2615e3f0f4fed67f2d3ff89719ba302f884eef2dbe68
-
C:\Users\Admin\AppData\Local\Temp\dveCQIQTAyDq.batFilesize
217B
MD52fe648ed7242d601150f9a487876a9b3
SHA19f72a3e059738327ed923a58b9a63bd342ddeb56
SHA2565a5a54e44810cda839b2d14238a5146352c59eda39a81d02253acf8f843018a3
SHA51292422adbbfa0002575b913c6cb6fa5ed066c4c00f4453232f0ed36f18989894cc3deab044edd6c3483ec8e00673be68a79b55a3b333bff0d85ef0b3c17140ab8
-
C:\Users\Admin\AppData\Roaming\Windows\$sxr-powershell.exeFilesize
409KB
MD5c4f70954d48c8653fde31fc63c619fc8
SHA1c2fe0bc4eab66f6cbf19ab3a80817eba8084982e
SHA256dbc30b002dad39a45fdd36c509d854dc931662235886f01ec149cd8cf904ddb5
SHA5121a0db425192d25f1e96ac43a5ae18ff530ef11e2f1526fd6677f4b82b04e212679c347f5647be0d72665e2f587c2824b19d2104c48546eb049ae27fb7470defc
-
memory/448-15-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-14-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-16-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-7-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-8-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-9-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-13-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-19-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-18-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/448-17-0x000001678C9C0000-0x000001678C9C1000-memory.dmpFilesize
4KB
-
memory/4900-6-0x0000000005450000-0x0000000005462000-memory.dmpFilesize
72KB
-
memory/4900-0-0x00000000753EE000-0x00000000753EF000-memory.dmpFilesize
4KB
-
memory/4900-5-0x0000000004FB0000-0x0000000005016000-memory.dmpFilesize
408KB
-
memory/4900-20-0x00000000753EE000-0x00000000753EF000-memory.dmpFilesize
4KB
-
memory/4900-21-0x00000000753E0000-0x0000000075B90000-memory.dmpFilesize
7.7MB
-
memory/4900-4-0x00000000753E0000-0x0000000075B90000-memory.dmpFilesize
7.7MB
-
memory/4900-28-0x00000000753E0000-0x0000000075B90000-memory.dmpFilesize
7.7MB
-
memory/4900-3-0x0000000004F10000-0x0000000004FA2000-memory.dmpFilesize
584KB
-
memory/4900-2-0x00000000054C0000-0x0000000005A64000-memory.dmpFilesize
5.6MB
-
memory/4900-1-0x0000000000470000-0x00000000004DC000-memory.dmpFilesize
432KB