Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 01:35
Behavioral task
behavioral1
Sample
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe
Resource
win10v2004-20240426-en
General
-
Target
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe
-
Size
3.1MB
-
MD5
f1dd84b637552358cfc4b9dda1dc04f7
-
SHA1
118d8a8f4df0bd95303c977f2fa2883dbd8f4222
-
SHA256
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413
-
SHA512
ff54ac3d296fa0907a073922b19067c942b398290c86d7b2b176f5d15c49b6486348499ac5f121aef8e5bb9ecbd1c4c6d00320528ac6b82701ccec64cf91f5da
-
SSDEEP
49152:GvUt62XlaSFNWPjljiFa2RoUYI5zbvsBx3AoGdkTHHB72eh2NT:GvI62XlaSFNWPjljiFXRoUYI5fvr
Malware Config
Extracted
quasar
1.4.1
Krampus.gg
10.0.0.76:4782
b2297f47-c39d-4f55-91d6-74d9f38e9fd1
-
encryption_key
21407C13DE42FCCADE77E86119A8CD11B5DCC515
-
install_name
Krampus.gg.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4076-1-0x0000000000A40000-0x0000000000D64000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe family_quasar -
Detects Windows executables referencing non-Windows User-Agents 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4076-1-0x0000000000A40000-0x0000000000D64000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4076-1-0x0000000000A40000-0x0000000000D64000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables containing common artifacts observed in infostealers 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4076-1-0x0000000000A40000-0x0000000000D64000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe INDICATOR_SUSPICIOUS_GENInfoStealer -
Executes dropped EXE 1 IoCs
Processes:
Krampus.gg.exepid process 3044 Krampus.gg.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 840 schtasks.exe 5012 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exeKrampus.gg.exedescription pid process Token: SeDebugPrivilege 4076 fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe Token: SeDebugPrivilege 3044 Krampus.gg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Krampus.gg.exepid process 3044 Krampus.gg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exeKrampus.gg.exedescription pid process target process PID 4076 wrote to memory of 840 4076 fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe schtasks.exe PID 4076 wrote to memory of 840 4076 fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe schtasks.exe PID 4076 wrote to memory of 3044 4076 fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe Krampus.gg.exe PID 4076 wrote to memory of 3044 4076 fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe Krampus.gg.exe PID 3044 wrote to memory of 5012 3044 Krampus.gg.exe schtasks.exe PID 3044 wrote to memory of 5012 3044 Krampus.gg.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe"C:\Users\Admin\AppData\Local\Temp\fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:840 -
C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe"C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Krampus.gg.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5f1dd84b637552358cfc4b9dda1dc04f7
SHA1118d8a8f4df0bd95303c977f2fa2883dbd8f4222
SHA256fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413
SHA512ff54ac3d296fa0907a073922b19067c942b398290c86d7b2b176f5d15c49b6486348499ac5f121aef8e5bb9ecbd1c4c6d00320528ac6b82701ccec64cf91f5da