Analysis

  • max time kernel
    298s
  • max time network
    282s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 15:29

General

  • Target

    Uni.exe

  • Size

    409KB

  • MD5

    4c2bb0618a6eda615c8001d5a7ccd6c0

  • SHA1

    c88d2c8bfc5906a5cfef78893d1132edcffd71f0

  • SHA256

    abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

  • SHA512

    6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

  • SSDEEP

    12288:rpg6M1i1v6q1ak/e7xlX7nnvGAwhJLJO:lxqiii6xlLvGjhO

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

tue-jake.gl.at.ply.gg:29058

Mutex

$Sxr-xPAuDxLNyBmZ7S2WLJ

Attributes
  • encryption_key

    Pw78RUs175dFrKD7lMwH

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uni.exe
    "C:\Users\Admin\AppData\Local\Temp\Uni.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Uni.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:2488
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1672
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://jasonswain.co.uk/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2160
      • C:\Users\Admin\AppData\Local\Temp\lSQEV3ndmzox.exe
        "C:\Users\Admin\AppData\Local\Temp\lSQEV3ndmzox.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 928
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1004
    • C:\Windows\SysWOW64\SCHTASKS.exe
      "SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Uni.exe'" /sc onlogon /rl HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:2948
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:692
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1868
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
    1⤵
      PID:1512
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
        PID:2028
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\main.cpl ,1
        1⤵
          PID:2540
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
          1⤵
            PID:1924
          • C:\Windows\SysWOW64\DllHost.exe
            C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
            1⤵
              PID:3004

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              9b05d260a03277f90cace6d8d571a3bd

              SHA1

              58a15c7bd456904a94371ee5ec7f57c434e74825

              SHA256

              108e0f2f974930d87c83ee9a0e468aef1ce00d6d80e30ee0367f9c537004934e

              SHA512

              19fb75bfe1815a425315a642f69aaebfdc3a516119ba96a56a052f992955f3a30a6ddb859dc52c59e98f536e9e8aeae355fb4cfa7f9e5ad73cbf30b325f697bf

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              ba12c7c48a1fe6be3e52daaf1e8879c6

              SHA1

              a78b0fcde9d4a7d2d4859d414a34d9d5b0b1373f

              SHA256

              a7cc6a310bff06b64c26f3ddd85d9dae9d5d5d592e4cdbf5b33652ae789118f8

              SHA512

              683ed2df26f8e29017a621351aea68f145c1e91cfd6191b9d5cdd46666ebc908e16ddab4135ada2cc5a75161be27a5d38b99eb6cd1315d15c327cd83e28d5fc9

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              e407a6f549e219da0c4dc9debc11eeae

              SHA1

              8f42852c9396c73aed035ecc23520746ba137a41

              SHA256

              63913fc11b9c7c9abc31ec68a89dd18c0db37e2b47bf75b27c437412b4202fa0

              SHA512

              abc3ba3183dcdc9e41b216e6ec804b3b8310c6767dc36dbf198bcdfb600d3eabbe87227e1f086093a9a0aa224d5405c9fd2cccd1a42c64daf63e9a7173da71ce

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              b475d025ed2c27eadbfce9dfc6601604

              SHA1

              424b820301c878bd6b919f9156ece868d58c567d

              SHA256

              6f53f66306295784f8112ed960b062462bafabcdd0535f3d204e796d91781d53

              SHA512

              e3bb68f851e61a3c0a470c52c2dbd5193d4ec0f6b5d45506086bccb29bf53d1486b0dcbeffb17ea191367d00024b126714ba16c13239f24d55c13657fb0dc808

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              f370ee0b85edbe2349020b0a315b07cb

              SHA1

              a647c1badb1bb75a19ba18863372a33204fb4413

              SHA256

              59409076475f00a81cfaec54a05d0d34d24c37395bea5e0c74de6bbd4b647c33

              SHA512

              2b61ad3a58ae7bf1b97f82d185e330be2cc43f58e9cbc0cd15cbad5103e596033fd918dd96982c09e642b9b62624d68a602baa5264c7f97b834c0b49f0d02a47

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              2b1bd24dcea1947da1709d194a75dbbb

              SHA1

              bf61047e79df3acaa2229c597517ae0816dbd964

              SHA256

              41ba5c1fe7a5058fb10fa67d0ccab0a7fc562145c497b153c694939b02b3d8d6

              SHA512

              bdcbf01b41be24debf79b29890ee27cfc54bede791379cf82c071d9653e448c4c6ac6dd3307711e06a93db8514b6a40e0e62f989749760101d0efde2f6ce3726

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              c7f3eb54bea79b4490fd37e8c878ba94

              SHA1

              792a4c7bf87e51cb18feb2f923c27407e7ee611c

              SHA256

              8847d167e344d10f8e792392da015718cc2595d4788d4b3f584890a5be2b8833

              SHA512

              8b7e81dfc034570c7b561c5b6477b1ec5c26eed8d4a93125f44e212c631e8753cae9f9eefdd56000003cb99fd88470d7e15490230e5ebc3d3710a5ec0bad388b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              a6fe07ffede8f566dba8fb252864f747

              SHA1

              3c3eca8c5da7a4a806aa7bf1a6224fb0f36b994c

              SHA256

              374cb3e0178ebbaed2f5d65da92f55562849cc13d62db86645cf2f97556f68e0

              SHA512

              b3e6a155bf1f0598bbbe967a321cedebb7bcb80c4d5902a555ac7d887cac300cf35f93d037eb977a976a9e986c9c4c7db46b64de2d8d3935be4970695e1681ed

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              1bdd5b5067863d17c4bf2025520068c9

              SHA1

              ec7d3e2fb881bec9b981e84f28ece4656b20c704

              SHA256

              738c60f991ef185c054a1f3ac3832d054bb9ab92d57b964f6cbca511e7ef4d88

              SHA512

              67f66d8e671abaf24ffbded1ee9cd0623bf8134375213fec3654f3f6105b64e6c2061e2d50cd3f3a92b74f221714cbdbcd0caec8ab76949225bb1c3dd69e69ac

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              37d9691131bf678734cb806b5eca0348

              SHA1

              d9440708b7ab35a04212ab1c22af8ca1a4500993

              SHA256

              be6b0fdd865c1825317eb5a2a7b3ac6af3768155bed2861af809eb3cd2606353

              SHA512

              2233a08e6b5636726ceba87c9afd4f9f6c06221c5bc3d8df41736f35c504afae8d457fd1577eae61147d94c1ac64ad34cdec01530f093104ae870a55bd71788c

            • C:\Users\Admin\AppData\Local\Temp\Tar966D.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Local\Temp\lSQEV3ndmzox.exe

              Filesize

              277KB

              MD5

              dac0c5b2380cbdd93b46763427c9f8df

              SHA1

              038089e1a0ac8375be797fc3ce7ae719abc72834

              SHA256

              d02538788fb57f568ece292f5fc20e9775c86d504de67f57e22534f84adc73c6

              SHA512

              05cc1f6bf25a6545a06c735ae7a4a7fc25489bdb9fbc8d5797be623982662c4a93cba2d20bfe14313ef1548eaaa691e55fabdd8e3d3e45de9ab42dc62f9a7023

            • \Users\Admin\AppData\Roaming\SubDir\Client.exe

              Filesize

              409KB

              MD5

              4c2bb0618a6eda615c8001d5a7ccd6c0

              SHA1

              c88d2c8bfc5906a5cfef78893d1132edcffd71f0

              SHA256

              abcda524c02f9381d8d43f9ec0079d854db821d77f45e88f50606f46871f81d6

              SHA512

              6abe53339656a023e2a0547f1c2249789c33091d67a21f2e689c6411dc5357e34ec3c65634b6f6955a5023d20803f7c746b13f574bcd84b008abb4a97ea61027

            • memory/692-673-0x000000013FE50000-0x000000013FF48000-memory.dmp

              Filesize

              992KB

            • memory/692-675-0x000007FEF5CC0000-0x000007FEF5F74000-memory.dmp

              Filesize

              2.7MB

            • memory/692-704-0x000007FEF4AE0000-0x000007FEF5B8B000-memory.dmp

              Filesize

              16.7MB

            • memory/692-683-0x000007FEF4A70000-0x000007FEF4AD7000-memory.dmp

              Filesize

              412KB

            • memory/692-682-0x000007FEF4AE0000-0x000007FEF5B8B000-memory.dmp

              Filesize

              16.7MB

            • memory/692-680-0x000007FEF6690000-0x000007FEF66AD000-memory.dmp

              Filesize

              116KB

            • memory/692-681-0x000007FEF6670000-0x000007FEF6681000-memory.dmp

              Filesize

              68KB

            • memory/692-679-0x000007FEF7150000-0x000007FEF7167000-memory.dmp

              Filesize

              92KB

            • memory/692-678-0x000007FEF7230000-0x000007FEF7241000-memory.dmp

              Filesize

              68KB

            • memory/692-674-0x000007FEF7170000-0x000007FEF71A4000-memory.dmp

              Filesize

              208KB

            • memory/692-677-0x000007FEF72C0000-0x000007FEF72D7000-memory.dmp

              Filesize

              92KB

            • memory/692-676-0x000007FEF8000000-0x000007FEF8018000-memory.dmp

              Filesize

              96KB

            • memory/1868-694-0x000007FEF4A70000-0x000007FEF4AD7000-memory.dmp

              Filesize

              412KB

            • memory/1868-690-0x000007FEF7150000-0x000007FEF7167000-memory.dmp

              Filesize

              92KB

            • memory/1868-715-0x000007FEF4AE0000-0x000007FEF5B8B000-memory.dmp

              Filesize

              16.7MB

            • memory/1868-693-0x000007FEF4AE0000-0x000007FEF5B8B000-memory.dmp

              Filesize

              16.7MB

            • memory/1868-687-0x000007FEF8000000-0x000007FEF8018000-memory.dmp

              Filesize

              96KB

            • memory/1868-688-0x000007FEF72C0000-0x000007FEF72D7000-memory.dmp

              Filesize

              92KB

            • memory/1868-684-0x000000013FE50000-0x000000013FF48000-memory.dmp

              Filesize

              992KB

            • memory/1868-689-0x000007FEF7230000-0x000007FEF7241000-memory.dmp

              Filesize

              68KB

            • memory/1868-685-0x000007FEF7170000-0x000007FEF71A4000-memory.dmp

              Filesize

              208KB

            • memory/1868-686-0x000007FEF5CC0000-0x000007FEF5F74000-memory.dmp

              Filesize

              2.7MB

            • memory/1868-691-0x000007FEF6690000-0x000007FEF66AD000-memory.dmp

              Filesize

              116KB

            • memory/1868-692-0x000007FEF6670000-0x000007FEF6681000-memory.dmp

              Filesize

              68KB

            • memory/2240-0-0x000000007454E000-0x000000007454F000-memory.dmp

              Filesize

              4KB

            • memory/2240-2-0x0000000074540000-0x0000000074C2E000-memory.dmp

              Filesize

              6.9MB

            • memory/2240-14-0x0000000074540000-0x0000000074C2E000-memory.dmp

              Filesize

              6.9MB

            • memory/2240-1-0x00000000003A0000-0x000000000040C000-memory.dmp

              Filesize

              432KB

            • memory/2784-15-0x0000000074540000-0x0000000074C2E000-memory.dmp

              Filesize

              6.9MB

            • memory/2784-12-0x0000000074540000-0x0000000074C2E000-memory.dmp

              Filesize

              6.9MB

            • memory/2784-11-0x0000000074540000-0x0000000074C2E000-memory.dmp

              Filesize

              6.9MB

            • memory/2784-10-0x0000000001340000-0x00000000013AC000-memory.dmp

              Filesize

              432KB