Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 02:07
Behavioral task
behavioral1
Sample
84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe
-
Size
3.1MB
-
MD5
84dcf85ef6b6da9fb86db16e777e1780
-
SHA1
7fb44a0549aefd0a353bf4b19b690b4ec5c6647a
-
SHA256
108ba2d8bbbd602580d507f9abd001b0ce97381008e2f7becefdfc728ef2acf0
-
SHA512
4a121c119531ee6bdfc4ce7ee6fbf64b910f0557d7828399df0f549a5656737b343eb4cad48c7682643b6dddbcb7cde9c055f18bc718223682ae09f49cc1695c
-
SSDEEP
49152:2vQt62XlaSFNWPjljiFa2RoUYIEfX4ECswk/G8GoGd1owOTHHB72eh2NT:2vc62XlaSFNWPjljiFXRoUYIEfXYx6
Malware Config
Extracted
quasar
1.4.1
Clients
195.20.255.80:1738
605f2851-0092-4098-9c57-f2d81f9174e3
-
encryption_key
EF6FD7046495B125241282E670A0F8EEF4DE6EF4
-
install_name
solara.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
solara executor
-
subdirectory
solara
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-1-0x0000000000360000-0x0000000000684000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\solara\solara.exe family_quasar behavioral1/memory/2596-8-0x0000000000350000-0x0000000000674000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
Processes:
solara.exepid process 2596 solara.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3032 schtasks.exe 2880 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exesolara.exedescription pid process Token: SeDebugPrivilege 1968 84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe Token: SeDebugPrivilege 2596 solara.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
solara.exepid process 2596 solara.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
solara.exepid process 2596 solara.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
solara.exepid process 2596 solara.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exesolara.exedescription pid process target process PID 1968 wrote to memory of 3032 1968 84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe schtasks.exe PID 1968 wrote to memory of 3032 1968 84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe schtasks.exe PID 1968 wrote to memory of 3032 1968 84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe schtasks.exe PID 1968 wrote to memory of 2596 1968 84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe solara.exe PID 1968 wrote to memory of 2596 1968 84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe solara.exe PID 1968 wrote to memory of 2596 1968 84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe solara.exe PID 2596 wrote to memory of 2880 2596 solara.exe schtasks.exe PID 2596 wrote to memory of 2880 2596 solara.exe schtasks.exe PID 2596 wrote to memory of 2880 2596 solara.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\84dcf85ef6b6da9fb86db16e777e1780_NeikiAnalytics.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "solara executor" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\solara\solara.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3032 -
C:\Users\Admin\AppData\Roaming\solara\solara.exe"C:\Users\Admin\AppData\Roaming\solara\solara.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "solara executor" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\solara\solara.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD584dcf85ef6b6da9fb86db16e777e1780
SHA17fb44a0549aefd0a353bf4b19b690b4ec5c6647a
SHA256108ba2d8bbbd602580d507f9abd001b0ce97381008e2f7becefdfc728ef2acf0
SHA5124a121c119531ee6bdfc4ce7ee6fbf64b910f0557d7828399df0f549a5656737b343eb4cad48c7682643b6dddbcb7cde9c055f18bc718223682ae09f49cc1695c