Analysis
-
max time kernel
204s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 23:24
Behavioral task
behavioral1
Sample
New.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
New.exe
Resource
win10v2004-20240508-en
General
-
Target
New.exe
-
Size
409KB
-
MD5
cf570b21f42f0ce411b7c9961068931e
-
SHA1
f92aa688a1dbd64a4585ecfe80a9c2d7f408c57d
-
SHA256
d0c4045c70a0822806a4e56d7883821cd2c19362f1cfed3bcbdb1e1b8eb15234
-
SHA512
de9dce8300656cd8531569011d043373193cbda125b738e66a5bf107178b48781d6dc88eea696b2074c352a1bf56a4693cfae62e668993ac24ce18aebfdcd684
-
SSDEEP
12288:jpyJcC+PgUUboV2hShYoyTyrIh9eqh6bIK+Pz9:9wd+Y2IweyA9eqkMZ
Malware Config
Extracted
quasar
3.1.5
Video
runderscore00-25501.portmap.host:25501
$Sxr-oWTh3ZS9htfe80iIl5
-
encryption_key
zK8u0rpHf4TJzGf65Flt
-
install_name
Win11.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Windows 11 Boot
-
subdirectory
Win11
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1800-1-0x0000000000F00000-0x0000000000F6C000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
New.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation New.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
New.exedescription pid process Token: SeDebugPrivilege 1800 New.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
New.exepid process 1800 New.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
New.execmd.exedescription pid process target process PID 1800 wrote to memory of 3572 1800 New.exe cmd.exe PID 1800 wrote to memory of 3572 1800 New.exe cmd.exe PID 1800 wrote to memory of 3572 1800 New.exe cmd.exe PID 3572 wrote to memory of 2700 3572 cmd.exe chcp.com PID 3572 wrote to memory of 2700 3572 cmd.exe chcp.com PID 3572 wrote to memory of 2700 3572 cmd.exe chcp.com PID 3572 wrote to memory of 4496 3572 cmd.exe PING.EXE PID 3572 wrote to memory of 4496 3572 cmd.exe PING.EXE PID 3572 wrote to memory of 4496 3572 cmd.exe PING.EXE PID 1800 wrote to memory of 2540 1800 New.exe SCHTASKS.exe PID 1800 wrote to memory of 2540 1800 New.exe SCHTASKS.exe PID 1800 wrote to memory of 2540 1800 New.exe SCHTASKS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New.exe"C:\Users\Admin\AppData\Local\Temp\New.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sX8tIBvchmaV.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2700
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:4496 -
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77New.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\New.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD5bcd837a5c3a46e32daa119e4b886595b
SHA147966e4245a0a88f30d12c266242a6ac4857b8b9
SHA25672741c50a095075cd5e4cd7e47f809fb9fb5f01ef1b06936cf2546df49209bcd
SHA512a17c11c022a84404f3ee0357489ae01702fcf18a40078912d3212db1a5713f2223a413539c85aa84a94d91aabe8b2cc06079b0ba43c8c20c24d9f7f2593a8d99
-
Filesize
224B
MD51e1197daea125fef6f6ab43d7dab2529
SHA1e8f5634b30a6f81085a06f5820dfc8f92185539d
SHA2568f249049044e76a4337b42f5cad12350c5fa31889fea7688990979a0923ba017
SHA512b2096d3702a018783f8495bb1cc54e058a9acc6309222b7b575a7edaf3746870029719b3fe9f1f0670c8c1b8ba348c7bc6ca671378a38523e20dcf146b976f9a