Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 03:36
Behavioral task
behavioral1
Sample
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe
Resource
win7-20240508-en
General
-
Target
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe
-
Size
968KB
-
MD5
c82a3da38e0debb9a378f1dc3777c33e
-
SHA1
aa6c7428f186d9498ca705b9c0d58736757a632e
-
SHA256
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3
-
SHA512
628cda89421e6327ba5a274d28386faf0b56c35f52dc237bbc310aef2a20ec5d5b7fb1bc4f22d610981ce5c6a9733bfc16568f473eb23b43094637b1db969cc1
-
SSDEEP
24576:FmtpMM4Qevjz8fSEhQKQWxUg9RzZtNMiTRqfLj:EpviIOYxUQRzZtNyj
Malware Config
Extracted
quasar
2.1.0.0
Windows Security
37.0.14.203:7812
VNM_MUTEX_2r4e6JnVsMyKl6Aod6
-
encryption_key
7m3r0pz1Q0GDX0J3KjKp
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Updated
-
subdirectory
Win32
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/2836-1-0x0000000000140000-0x00000000001CC000-memory.dmp disable_win_def C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe disable_win_def -
Processes:
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-1-0x0000000000140000-0x00000000001CC000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe family_stormkitty -
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe family_asyncrat -
Detects Windows executables referencing non-Windows User-Agents 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-1-0x0000000000140000-0x00000000001CC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-1-0x0000000000140000-0x00000000001CC000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Detects executables containing URLs to raw contents of a Github gist 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-1-0x0000000000140000-0x00000000001CC000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-1-0x0000000000140000-0x00000000001CC000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables referencing Discord tokens regular expressions 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_Discord_Regex -
Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing credit card regular expressions 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables using Telegram Chat Bot 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Detects executables with interest in wireless interface using netsh 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon -
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Executes dropped EXE 1 IoCs
Processes:
Windows Security.exepid process 4148 Windows Security.exe -
Processes:
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2908 schtasks.exe 2172 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
powershell.exedec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exedec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exepid process 2772 powershell.exe 2772 powershell.exe 2772 powershell.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 956 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe 956 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exepowershell.exeWindows Security.exedec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exedescription pid process Token: SeDebugPrivilege 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 4148 Windows Security.exe Token: SeDebugPrivilege 4148 Windows Security.exe Token: SeDebugPrivilege 956 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Security.exepid process 4148 Windows Security.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exeWindows Security.execmd.execmd.exedescription pid process target process PID 2836 wrote to memory of 2908 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe schtasks.exe PID 2836 wrote to memory of 2908 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe schtasks.exe PID 2836 wrote to memory of 2908 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe schtasks.exe PID 2836 wrote to memory of 4148 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Windows Security.exe PID 2836 wrote to memory of 4148 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Windows Security.exe PID 2836 wrote to memory of 4148 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe Windows Security.exe PID 2836 wrote to memory of 2772 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe powershell.exe PID 2836 wrote to memory of 2772 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe powershell.exe PID 2836 wrote to memory of 2772 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe powershell.exe PID 4148 wrote to memory of 2172 4148 Windows Security.exe schtasks.exe PID 4148 wrote to memory of 2172 4148 Windows Security.exe schtasks.exe PID 4148 wrote to memory of 2172 4148 Windows Security.exe schtasks.exe PID 2836 wrote to memory of 1632 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe cmd.exe PID 2836 wrote to memory of 1632 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe cmd.exe PID 2836 wrote to memory of 1632 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe cmd.exe PID 1632 wrote to memory of 2844 1632 cmd.exe cmd.exe PID 1632 wrote to memory of 2844 1632 cmd.exe cmd.exe PID 1632 wrote to memory of 2844 1632 cmd.exe cmd.exe PID 2836 wrote to memory of 2476 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe cmd.exe PID 2836 wrote to memory of 2476 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe cmd.exe PID 2836 wrote to memory of 2476 2836 dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe cmd.exe PID 2476 wrote to memory of 2772 2476 cmd.exe chcp.com PID 2476 wrote to memory of 2772 2476 cmd.exe chcp.com PID 2476 wrote to memory of 2772 2476 cmd.exe chcp.com PID 2476 wrote to memory of 3324 2476 cmd.exe PING.EXE PID 2476 wrote to memory of 3324 2476 cmd.exe PING.EXE PID 2476 wrote to memory of 3324 2476 cmd.exe PING.EXE PID 2476 wrote to memory of 956 2476 cmd.exe dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe PID 2476 wrote to memory of 956 2476 cmd.exe dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe PID 2476 wrote to memory of 956 2476 cmd.exe dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Updated" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2908 -
C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe"C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Updated" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Win32\Windows Security.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*3⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BZHS1jtf6ZIY.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2772
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"C:\Users\Admin\AppData\Local\Temp\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3772,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:81⤵PID:4308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3.exe.log
Filesize1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
261B
MD58887fe53971121aa779c1d8867d38c2b
SHA1230cc34c01e21e1aff999fbc9c384bca6cccd9b1
SHA2566f0977bbdf09d7940a1cc6f34c05f1a0d1da8f0010738b8bd354977c63af6336
SHA512ed06d62e135157d4e7245b93e887c066ec9576caba225801e3eb2ead0c6d0bfdd318a7f3398865b740a9f02182daee0941c987c26df8519da0c15a5c40c058c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
968KB
MD5c82a3da38e0debb9a378f1dc3777c33e
SHA1aa6c7428f186d9498ca705b9c0d58736757a632e
SHA256dec50393ebe75e7a9b14f7c14bf75a7ffe083bac7361bbbcf0f2be554c966ff3
SHA512628cda89421e6327ba5a274d28386faf0b56c35f52dc237bbc310aef2a20ec5d5b7fb1bc4f22d610981ce5c6a9733bfc16568f473eb23b43094637b1db969cc1