Analysis
-
max time kernel
1382s -
max time network
1172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 02:53
Behavioral task
behavioral1
Sample
SynV2.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
SynV2.exe
Resource
win10v2004-20240508-en
General
-
Target
SynV2.exe
-
Size
3.1MB
-
MD5
007e5cb679d162307ae1e97aae6b60bb
-
SHA1
a03429b7d5bf4fbe507863f110782b17b3de98ef
-
SHA256
82c4ebbea3a1cf61cb81196e865149b679df63dacaceef1e1242ce9b855aedf7
-
SHA512
eb2298577149e34238475eee4329ac031efe4433ca8d3b9951bc1914c52e633a8c4b1034c4ff9b6f79364250cede584b25d9c13556f4fe35ec6be5ac0661a2c0
-
SSDEEP
49152:pvjt62XlaSFNWPjljiFa2RoUYI204lhhgvJ6EoGdxsTHHB72eh2NT:pvx62XlaSFNWPjljiFXRoUYIchm
Malware Config
Extracted
quasar
1.4.1
Shiba
sites-mood.gl.at.ply.gg:50107
987c652c-2a4e-4c5d-bc39-00c8c0f35c5c
-
encryption_key
A88D7FED7F655EBDC4F99C21BAE5EC62300AADC7
-
install_name
$sxr-insta.exe
-
log_directory
$sxr-logs
-
reconnect_delay
1000
-
startup_key
$sxr-mstha
-
subdirectory
$sxr-start
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/220-1-0x0000000000670000-0x0000000000994000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation SynV2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1268 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 220 SynV2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 220 wrote to memory of 1908 220 SynV2.exe 90 PID 220 wrote to memory of 1908 220 SynV2.exe 90 PID 1908 wrote to memory of 3644 1908 cmd.exe 92 PID 1908 wrote to memory of 3644 1908 cmd.exe 92 PID 1908 wrote to memory of 1268 1908 cmd.exe 93 PID 1908 wrote to memory of 1268 1908 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynV2.exe"C:\Users\Admin\AppData\Local\Temp\SynV2.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Q8Hs0vuES6Kx.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3644
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD567508d7b35033c0d5282542e07319ff4
SHA162dc80676c93612f406b7502ffec817c4dc9db05
SHA2564a26907545b226e82319decc62519aa5291a7bb57557612a3f834d967f93deba
SHA5122e1b6b0332f0431d746663a2d676388f43d43fad42f1f8ad2dfd4ea398063a5748c00d90878961b78b73afd619c5aac3c4ae0d892ccb0b55ad0d9643605c95b1