Analysis
-
max time kernel
496s -
max time network
1612s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
12-05-2024 02:53
Behavioral task
behavioral1
Sample
SynV2.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
SynV2.exe
Resource
win10v2004-20240426-en
General
-
Target
SynV2.exe
-
Size
3.1MB
-
MD5
007e5cb679d162307ae1e97aae6b60bb
-
SHA1
a03429b7d5bf4fbe507863f110782b17b3de98ef
-
SHA256
82c4ebbea3a1cf61cb81196e865149b679df63dacaceef1e1242ce9b855aedf7
-
SHA512
eb2298577149e34238475eee4329ac031efe4433ca8d3b9951bc1914c52e633a8c4b1034c4ff9b6f79364250cede584b25d9c13556f4fe35ec6be5ac0661a2c0
-
SSDEEP
49152:pvjt62XlaSFNWPjljiFa2RoUYI204lhhgvJ6EoGdxsTHHB72eh2NT:pvx62XlaSFNWPjljiFXRoUYIchm
Malware Config
Extracted
quasar
1.4.1
Shiba
sites-mood.gl.at.ply.gg:50107
987c652c-2a4e-4c5d-bc39-00c8c0f35c5c
-
encryption_key
A88D7FED7F655EBDC4F99C21BAE5EC62300AADC7
-
install_name
$sxr-insta.exe
-
log_directory
$sxr-logs
-
reconnect_delay
1000
-
startup_key
$sxr-mstha
-
subdirectory
$sxr-start
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1820-1-0x0000000000E30000-0x0000000001154000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3876 ipconfig.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SynV2.exedescription pid process Token: SeDebugPrivilege 1820 SynV2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SynV2.execmd.execmd.exedescription pid process target process PID 1820 wrote to memory of 1864 1820 SynV2.exe cmd.exe PID 1820 wrote to memory of 1864 1820 SynV2.exe cmd.exe PID 1864 wrote to memory of 2244 1864 cmd.exe chcp.com PID 1864 wrote to memory of 2244 1864 cmd.exe chcp.com PID 1864 wrote to memory of 3876 1864 cmd.exe ipconfig.exe PID 1864 wrote to memory of 3876 1864 cmd.exe ipconfig.exe PID 1820 wrote to memory of 3020 1820 SynV2.exe cmd.exe PID 1820 wrote to memory of 3020 1820 SynV2.exe cmd.exe PID 3020 wrote to memory of 4840 3020 cmd.exe chcp.com PID 3020 wrote to memory of 4840 3020 cmd.exe chcp.com PID 3020 wrote to memory of 1076 3020 cmd.exe PING.EXE PID 3020 wrote to memory of 1076 3020 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynV2.exe"C:\Users\Admin\AppData\Local\Temp\SynV2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /K CHCP 4372⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\chcp.comCHCP 4373⤵PID:2244
-
C:\Windows\system32\ipconfig.exeipconfig3⤵
- Gathers network information
PID:3876 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HcKm5cPFnOtm.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4840
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD5dee25fd7961b143f586e88132266d8b3
SHA1d958ba410ba151983a2598ba079da24707321367
SHA25645cd86404913322caefab55c8f63ada7431956958bbc869c003a888153dbc413
SHA51251a8ad37d79c3b94ce384e42692534b9eff8f46c9e419f183137c8bcfe8d280354daff3dd24286bb1a1ed4c8686df59088d5a75199666c0e35eedefacf4c8dfe