Analysis
-
max time kernel
152s -
max time network
282s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 23:24
Behavioral task
behavioral1
Sample
New.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
New.exe
Resource
win10v2004-20240508-en
General
-
Target
New.exe
-
Size
409KB
-
MD5
cf570b21f42f0ce411b7c9961068931e
-
SHA1
f92aa688a1dbd64a4585ecfe80a9c2d7f408c57d
-
SHA256
d0c4045c70a0822806a4e56d7883821cd2c19362f1cfed3bcbdb1e1b8eb15234
-
SHA512
de9dce8300656cd8531569011d043373193cbda125b738e66a5bf107178b48781d6dc88eea696b2074c352a1bf56a4693cfae62e668993ac24ce18aebfdcd684
-
SSDEEP
12288:jpyJcC+PgUUboV2hShYoyTyrIh9eqh6bIK+Pz9:9wd+Y2IweyA9eqkMZ
Malware Config
Extracted
quasar
3.1.5
Video
runderscore00-25501.portmap.host:25501
$Sxr-oWTh3ZS9htfe80iIl5
-
encryption_key
zK8u0rpHf4TJzGf65Flt
-
install_name
Win11.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Windows 11 Boot
-
subdirectory
Win11
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral3/memory/2060-1-0x0000000000060000-0x00000000000CC000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
New.exedescription pid process Token: SeDebugPrivilege 2060 New.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
New.exepid process 2060 New.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
New.execmd.exedescription pid process target process PID 2060 wrote to memory of 4316 2060 New.exe cmd.exe PID 2060 wrote to memory of 4316 2060 New.exe cmd.exe PID 2060 wrote to memory of 4316 2060 New.exe cmd.exe PID 4316 wrote to memory of 1540 4316 cmd.exe chcp.com PID 4316 wrote to memory of 1540 4316 cmd.exe chcp.com PID 4316 wrote to memory of 1540 4316 cmd.exe chcp.com PID 4316 wrote to memory of 4180 4316 cmd.exe PING.EXE PID 4316 wrote to memory of 4180 4316 cmd.exe PING.EXE PID 4316 wrote to memory of 4180 4316 cmd.exe PING.EXE PID 2060 wrote to memory of 1412 2060 New.exe SCHTASKS.exe PID 2060 wrote to memory of 1412 2060 New.exe SCHTASKS.exe PID 2060 wrote to memory of 1412 2060 New.exe SCHTASKS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New.exe"C:\Users\Admin\AppData\Local\Temp\New.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g3OO9N4StHzv.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1540
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:4180 -
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77New.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\New.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD5e8349913397f8c199d3308bd91d73a48
SHA14c7ede99d0fdc68b91684baa1adc48d9a48d63a8
SHA2562bde23d1c027826051a4d339b5f6d77c4946d75dbf5743232b9da4e71dc6eacb
SHA51202b292a5ed025b82e3c0452b1bebc457dc646323ddbae49c4090431714529f266caa95c2c0e0a2a2454b4ce2c87382dd287d7db92b9a4f011f965e4bdb07d784
-
Filesize
224B
MD5137fe9ecaf2f1b3a99fe333396903e69
SHA1ad9b1c7ccafdf7d562c5bf96d1780d52f5ec50fc
SHA2563fc434987931fcbc33b4fe7daeda35b4b01782ddc6c9c55cf386c47a95116796
SHA51244ce261c546b038ad9508b675c6a2bf5c741e91539b1f75b3c80b424d615afbd52c1a8f2689b1804f817a925114cf6ef22ff33f2754accabb2f2130f947b5a20