Analysis
-
max time kernel
169s -
max time network
203s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2024 11:51
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240404-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
97cd39b10b06129cb419a72e1a1827b0
-
SHA1
d05b2d7cfdf8b12746ffc7a59be36634852390bd
-
SHA256
6bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc
-
SHA512
266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233
-
SSDEEP
49152:Kv7I22SsaNYfdPBldt698dBcjH2CRJ6nbR3LoGdDyaTHHB72eh2NT:KvE22SsaNYfdPBldt6+dBcjH2CRJ65T
Malware Config
Extracted
quasar
1.4.1
romka
jozzu420-51305.portmap.host:51305
0445c342-b551-411c-9b80-cd437437f491
-
encryption_key
E1BF1D99459F04CAF668F054744BC2C514B0A3D6
-
install_name
Romilyaa.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows 10 Boot
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4964-1-0x00000000007E0000-0x0000000000B04000-memory.dmp family_quasar C:\Program Files\SubDir\Romilyaa.exe family_quasar -
Executes dropped EXE 8 IoCs
Processes:
Romilyaa.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exepid process 1048 Romilyaa.exe 5028 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 3624 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3804 jCopfmKkuxsS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
jCopfmKkuxsS.exedescription ioc process File opened for modification \??\PhysicalDrive0 jCopfmKkuxsS.exe -
Drops file in Program Files directory 2 IoCs
Processes:
Client-built.exedescription ioc process File created C:\Program Files\SubDir\Romilyaa.exe Client-built.exe File opened for modification C:\Program Files\SubDir\Romilyaa.exe Client-built.exe -
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3848 schtasks.exe 5092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Romilyaa.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exepid process 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 4540 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
Client-built.exeRomilyaa.exetaskmgr.exejCopfmKkuxsS.exejCopfmKkuxsS.exedescription pid process Token: SeDebugPrivilege 4964 Client-built.exe Token: SeDebugPrivilege 1048 Romilyaa.exe Token: SeDebugPrivilege 3588 taskmgr.exe Token: SeSystemProfilePrivilege 3588 taskmgr.exe Token: SeCreateGlobalPrivilege 3588 taskmgr.exe Token: SeShutdownPrivilege 3484 jCopfmKkuxsS.exe Token: SeShutdownPrivilege 4540 jCopfmKkuxsS.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
Romilyaa.exetaskmgr.exepid process 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe -
Suspicious use of SendNotifyMessage 26 IoCs
Processes:
Romilyaa.exetaskmgr.exepid process 1048 Romilyaa.exe 1048 Romilyaa.exe 1048 Romilyaa.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe 3588 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
Romilyaa.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exejCopfmKkuxsS.exepid process 1048 Romilyaa.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe 2676 jCopfmKkuxsS.exe 3484 jCopfmKkuxsS.exe 4540 jCopfmKkuxsS.exe 3296 jCopfmKkuxsS.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
Client-built.exeRomilyaa.exejCopfmKkuxsS.exejCopfmKkuxsS.exedescription pid process target process PID 4964 wrote to memory of 3848 4964 Client-built.exe schtasks.exe PID 4964 wrote to memory of 3848 4964 Client-built.exe schtasks.exe PID 4964 wrote to memory of 1048 4964 Client-built.exe Romilyaa.exe PID 4964 wrote to memory of 1048 4964 Client-built.exe Romilyaa.exe PID 1048 wrote to memory of 5092 1048 Romilyaa.exe schtasks.exe PID 1048 wrote to memory of 5092 1048 Romilyaa.exe schtasks.exe PID 1048 wrote to memory of 5028 1048 Romilyaa.exe jCopfmKkuxsS.exe PID 1048 wrote to memory of 5028 1048 Romilyaa.exe jCopfmKkuxsS.exe PID 1048 wrote to memory of 5028 1048 Romilyaa.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 2676 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 2676 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 2676 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 4540 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 4540 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 4540 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3296 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3296 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3296 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3624 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3624 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3624 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3484 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3484 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3484 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3804 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3804 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 5028 wrote to memory of 3804 5028 jCopfmKkuxsS.exe jCopfmKkuxsS.exe PID 3804 wrote to memory of 2964 3804 jCopfmKkuxsS.exe notepad.exe PID 3804 wrote to memory of 2964 3804 jCopfmKkuxsS.exe notepad.exe PID 3804 wrote to memory of 2964 3804 jCopfmKkuxsS.exe notepad.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3848 -
C:\Program Files\SubDir\Romilyaa.exe"C:\Program Files\SubDir\Romilyaa.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe" /watchdog4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe" /watchdog4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe" /watchdog4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe" /watchdog4⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe" /watchdog4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe"C:\Users\Admin\AppData\Local\Temp\jCopfmKkuxsS.exe" /main4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt5⤵PID:2964
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD597cd39b10b06129cb419a72e1a1827b0
SHA1d05b2d7cfdf8b12746ffc7a59be36634852390bd
SHA2566bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc
SHA512266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233
-
Filesize
16KB
MD51d5ad9c8d3fee874d0feb8bfac220a11
SHA1ca6d3f7e6c784155f664a9179ca64e4034df9595
SHA2563872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
SHA512c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf