Analysis
-
max time kernel
90s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/05/2024, 01:10
Behavioral task
behavioral1
Sample
errr.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
errr.exe
Resource
win10v2004-20240508-en
General
-
Target
errr.exe
-
Size
3.1MB
-
MD5
ef7a21c06d5bde1ef0979fb8948fb7f7
-
SHA1
b5f5467ec426b7c68ba6586feea8652023948020
-
SHA256
424882a2484f8bacc7b3ffa79082ffe1d0f6b074fd2bb2b42b6b724a56332308
-
SHA512
4c42a031f83a966a61eb0e630cf6600965a6f9366d25704493101405705718c9e5d4b4df8caec5791f5500da0c87c6c74000583cc124dabc4bd8b214666bcf3a
-
SSDEEP
49152:hvUI22SsaNYfdPBldt698dBcjHFzR160bR3toGdoTHHB72eh2NT:hvZ22SsaNYfdPBldt6+dBcjHFzR16o
Malware Config
Extracted
quasar
1.4.1
Shiba
steel-repairs.gl.at.ply.gg:62743
987c652c-2a4e-4c5d-bc39-00c8c0f35c5c
-
encryption_key
A88D7FED7F655EBDC4F99C21BAE5EC62300AADC7
-
install_name
$sxr-insta.exe
-
log_directory
$sxr-logs
-
reconnect_delay
1000
-
startup_key
$sxr-mstha
-
subdirectory
$sxr-start
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral3/memory/3268-1-0x0000000000FC0000-0x00000000012E4000-memory.dmp family_quasar behavioral3/files/0x000100000002a9f4-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4172 $sxr-insta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2372 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3268 errr.exe Token: SeDebugPrivilege 4172 $sxr-insta.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4172 $sxr-insta.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3268 wrote to memory of 4172 3268 errr.exe 81 PID 3268 wrote to memory of 4172 3268 errr.exe 81 PID 4172 wrote to memory of 3640 4172 $sxr-insta.exe 84 PID 4172 wrote to memory of 3640 4172 $sxr-insta.exe 84 PID 3640 wrote to memory of 4180 3640 cmd.exe 86 PID 3640 wrote to memory of 4180 3640 cmd.exe 86 PID 3640 wrote to memory of 2372 3640 cmd.exe 87 PID 3640 wrote to memory of 2372 3640 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\errr.exe"C:\Users\Admin\AppData\Local\Temp\errr.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Roaming\$sxr-start\$sxr-insta.exe"C:\Users\Admin\AppData\Roaming\$sxr-start\$sxr-insta.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\G3eUYoy29hYV.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4180
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:2372
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD535211066e7ba476a15d98b6ca59ee980
SHA14f099abe89cc85e18e9d5ecf23a1c0a867ddd7c3
SHA25662825a7c733146f3c4b9e013e657441c55f2ff5c9893fef7b40b7ecbcb292bfe
SHA5123ce0b72bcc9864efa1f3397b43bfbdd4ad19b40d13994d812c75d81ea1ce31a024c4811954029e2fc292e70fef8241eb588e4013524b789961b391a5a13fdea5
-
Filesize
3.1MB
MD5ef7a21c06d5bde1ef0979fb8948fb7f7
SHA1b5f5467ec426b7c68ba6586feea8652023948020
SHA256424882a2484f8bacc7b3ffa79082ffe1d0f6b074fd2bb2b42b6b724a56332308
SHA5124c42a031f83a966a61eb0e630cf6600965a6f9366d25704493101405705718c9e5d4b4df8caec5791f5500da0c87c6c74000583cc124dabc4bd8b214666bcf3a