Analysis

  • max time kernel
    261s
  • max time network
    288s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 06:22

General

  • Target

    uni/Uni - Copy (5).exe

  • Size

    409KB

  • MD5

    b70fdac25a99501e3cae11f1b775249e

  • SHA1

    3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71

  • SHA256

    51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246

  • SHA512

    43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44

  • SSDEEP

    12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

panel-slave.gl.at.ply.gg:57059

panel-slave.gl.at.ply.gg:27892

Mutex

$Sxr-rpL8EItHN3pqIQQVy2

Attributes
  • encryption_key

    Lme7VBS3l58VwLM69PNM

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Signatures

  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 42 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (5).exe
    "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (5).exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (5).exe" /rl HIGHEST /f
      2⤵
      • Quasar RAT
      • Creates scheduled task(s)
      PID:2688
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:760
      • C:\Users\Admin\AppData\Local\Temp\dHSZJ0FwT0kJ.exe
        "C:\Users\Admin\AppData\Local\Temp\dHSZJ0FwT0kJ.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2100
      • C:\Windows\SysWOW64\SCHTASKS.exe
        "SCHTASKS.exe" /create /tn "$77Client.exe" /tr "'C:\Users\Admin\AppData\Roaming\SubDir\Client.exe'" /sc onlogon /rl HIGHEST
        3⤵
        • Creates scheduled task(s)
        PID:3000
    • C:\Windows\SysWOW64\SCHTASKS.exe
      "SCHTASKS.exe" /create /tn "$77Uni - Copy (5).exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (5).exe'" /sc onlogon /rl HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:2408
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x484
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1616
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\EditRegister.mht
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:996
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1304

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      df7f9062c8a7da510ecb3be80c2fab6e

      SHA1

      0f8ab68df8eef5e3d5bacefa9e5bad5750607218

      SHA256

      825f8b2cb64bf76a0f22558cd38a8161333794d0be311b0a7d2fc7eca4b41a74

      SHA512

      c135533e15b0dca750f2b35817308db2ce0419b7972643d024fcb4a1f89213ac5debe2b37ce39ae5a90889777081f53fd1e0dc7ea528c10462e5f3701cd8156d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      841e87e9c37939edbc79dfed6b1cb60d

      SHA1

      f3744e5a8c5d48b892cfe2a28d0fbbeff69dfcef

      SHA256

      f060bee8e48f533dfaeb276911a7581e540741bc87b9bf9e769cf457bc1c0c04

      SHA512

      33fae4bb575103c19fe194ef8321e1ecaff04263b81ac737beca94b7ff27cab1e31a2c36645051aee3cdb004bce640f2b170b2e5a925471205912d9a72dae5e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      02744f3673a533e096e47e7b113d44a2

      SHA1

      476dbf80d13adf4b54cec6449d7f161e619a7357

      SHA256

      e40304e1f39c23eb997380fca6506685f497cf05e9302d75942f41368b3abc52

      SHA512

      49a176ea4e4e1c2860ad13ce008a5537957622ec3aa0fadc31d0afc526de81e325854cd4543900636a5979f583161e86cabf10a0cbd93f59686f662805c78e96

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d0ef3a95d00c39de790e47093fcb1f41

      SHA1

      42295d19c72a2ff6f5015be1953e95d7630d993f

      SHA256

      f23b48644d6ede6e0d40b66eb23cd1c248d7d36ad275818defbe3684ea8bc781

      SHA512

      1f1cf077182823188375c1390b5e9d35841f6a7fb2cd213ae0f1891a1ef78ddee66ef094c64add9a6e74fe535d16a36ad1d6c426f30ab7e2ec6e7e1784294b4d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f1ff625e4edf237acd318614d19b3db7

      SHA1

      fb12e899faa96b12b0936eabab16ce0fe1466037

      SHA256

      9404be431fcb04bf13c9af1da5d053e50393e266bcc1181ec9c0b471ab7d74fe

      SHA512

      7b778f918a5f380d13ca5874085673d03f544868b727fcb8c6970b2575723d7d31d2ed6a70c721b4a9d0ded72f1bc603f1add3a7f4a327177534d0a2edef03e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c303c5da67b6d84fc5ff5892b0e2c9b1

      SHA1

      ed9745e826faed54b39576e4135cec958e02941f

      SHA256

      2569a98ed5e78268dcaea45b06bc4cfb588198c116db447d8b756d16ba5dc362

      SHA512

      3a0565376ad07abb722b45134da328960a4ce02137f69a87a3f4e5eb98a2ebfdb0487e1c697757a985c2daf07ab1751256ce65c8d507ece41ef3bb5f8e729242

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9405ba8fa94158fe4621031cb82d5ddf

      SHA1

      0df79c9d343911f9c2c1aec0b19b2bc225a2dd4e

      SHA256

      042641f1ef0c1d3455660562b8970f712d56c05bae3106f48001b4784e69ee14

      SHA512

      0c44b9abc85299c750ade4429c60fa8c2bf5e170428f6ff512cfe248bd4454ef86adbf3430af7fe837dc505adc50ad5b1f55113120fc3e7fabea45702acca543

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      eea71cffa710cd71d505bb8e485df3cc

      SHA1

      f34c537dd61b9b4461b43229c4075f01f6f1f436

      SHA256

      20f02f3217cd9d095904408ad1025bff0dcf2c10b8ec02302794f0b4723978ac

      SHA512

      c59be88cca7a6077d65ab82fad080369ad31ef39ce34b1a70f7411264633f84261d2745909fe186499a858753a8f5e0ea6368e3a7e962c1b9642c563899c6cac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0d30b3d3c004dd424639aa256aa6cf1e

      SHA1

      3ea9d27b932bd493af9589dc026a1a9da1f5e03e

      SHA256

      db230603a464b9a01f840ffc2f8370cdf8aa110e83b623569403f48fc3ce17c6

      SHA512

      84e95d7ab6f752216dcb1f9ed69d274a0874b4054987fa31c182d1ef9e8b8093b467113a0acd0b48b208a6e8d946dfd7a420bc2d838bdb4563f9ade59e54d033

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      21a4f79d09e32ce7059d2cd58a105220

      SHA1

      ab8f628b7c26ec71299e765d997bb6d10e34ee21

      SHA256

      b27bc502ea34638bd81341d43a0cbd7ea173adce643454fdbccbc49307c36867

      SHA512

      9ac73d44b8901bbf80231b6e58f0802dbad486575873cdc261a0d6edd200044df7f8464321f5256dc7852f37c255f3e3830eef272e76756bfd0a5006a518b661

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      095f01b265306f0c634c1189a63bad96

      SHA1

      d85e8289b6d40127d17a65649d2d968bafc794c3

      SHA256

      71aa63059df2f03afa1a89ea49965ee08768a618b190cc56ff3a357eaeb8419b

      SHA512

      ded3bd30b71bd5d44f77e78263f651d81924169cf88f33f1dfe041a547cd29930f0ac5e3303c8b93e3623d63ad378b1ee259e5ba8f0cf5527e0ae43e3d9ad289

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      8f9a57f111db00b340f756e49deaf638

      SHA1

      6bb2f7fc542801bf05bb84ef7e4476fab6330c9e

      SHA256

      c307ae8336467acd0acff8bffe48bd6f708391a5200359965d91741f9974b595

      SHA512

      7dfac05d07d42e6b73caaf537b8baa568d57e726d9a3472c4d447704062095b716cdb455be6d7a04c3891b576ae015af60b7892bc9ca01f5b5255b58471a5da4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      5bfb654f44328404437c9168e5c1faf6

      SHA1

      cf91d0ab9cf59c688b817eaee8a879f079e6a23f

      SHA256

      4f346bf75164af686ef1a8ad664d3a7539237383fbc622a18ad58c501fe1743e

      SHA512

      b6a0fb33cc436a6bd68b7ffbde61b9f0f46c632ea4643e65fbd10649eb95c3b5252299303942e35561c3ce89d6b80c7dfc910c2738d441aada3ae115bffed0dd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      81da5fb3bab40a2d6c70e3d35608841c

      SHA1

      6c9ce0f5070a675718035b60f008328d87104b8d

      SHA256

      67388a4509adc3c7aaba7ec8985998db452584676de5c96148caaec7a4bfb35f

      SHA512

      124e38fb256cb8c478e97fd126bddd98bdeafc3ac6d578a0b3704fff68609ab44cc7814a3bc1ccdf0406aa9ff95fddacf73baab63b69e5840a07689b288e1ce3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3f4aecbb1266fe5161634713f88e6e82

      SHA1

      79359e44cfc2d369a5d2d09b0abde8633a4bd15b

      SHA256

      c1e6f40637befb1bd1d20a3eed8d688fcbc678a690f50e75560ad95a8cc466d3

      SHA512

      c00d2418979a0b3ede94430d884b41388523289e93367044be3e3f01b06f53e81c6d0f9b9435d933fb79a3f14b190e378324f47d590388f08b9feb893ccd9c01

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ebe192f9b9e3c6ebdbefe07341128d9c

      SHA1

      11aee2b21c9c7caf5846e0650def4c96bef020be

      SHA256

      5436560634d0e73dd509a53c08d84ec41466ccdc4bc091b6c2409e60090c6341

      SHA512

      6cc1776feadde1096e4c269417780d6e863adfb1dd2cee2b8a7e9dfd37e1e6122684a00ccc428d495d05b1aec7ae19720dd02c0586373b36e5dcf322ecdf9616

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c3946119489a0daefbebe58a29bdd91e

      SHA1

      8733e4b2cadd1eb6ca401df57e7c688d978643cb

      SHA256

      0c76a5a82f0a0a9b85f383d1733181c164e5aba942d97bbde2de7d8788a1536f

      SHA512

      26fe1db3bb6e81a37b1d9649de40accd7708c8051228d762470ff7283f44cb3f39be7f8dafd6ecf75642c6fededfa5b67c5e28b162803907e9128a3da35cc2be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      3e05d77edb296afcf79982e6d8eea726

      SHA1

      eb7a01e998a50dd93306ffc47af5214ebdc89109

      SHA256

      e94ba53ceec6d038fd06127754e5c8a3eaff1bdd071c164e2805a4da446c175b

      SHA512

      d478b5da70fe237218709b721232d0ebea090e89aec4498c56d537407c4c4be6ac32aa7ee0d7dca26f28ff65b13338a057829c830dc6b659a336bd1a8ec60162

    • C:\Users\Admin\AppData\Local\Temp\CabA50.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\CabB2D.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Q60WCLBJ.htm
      Filesize

      528KB

      MD5

      a47b11feeb0984d44114bc58bf17b22d

      SHA1

      725c6fbbc0419539bd1794863161c8e5521038a5

      SHA256

      9bfe19ea72ebdcc2e8b4c6782da3a415d6c8f3b770f115045556d993597b06b7

      SHA512

      d147910af98296b68d30255dc5e18dccc2eb84606229e9d9bf763536c6c8371a078cc549e3f1663b29714f8e5f94c34f54f6a4d90621f91267b5f6d09971e747

    • C:\Users\Admin\AppData\Local\Temp\TarB51.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\dHSZJ0FwT0kJ.exe
      Filesize

      277KB

      MD5

      dac0c5b2380cbdd93b46763427c9f8df

      SHA1

      038089e1a0ac8375be797fc3ce7ae719abc72834

      SHA256

      d02538788fb57f568ece292f5fc20e9775c86d504de67f57e22534f84adc73c6

      SHA512

      05cc1f6bf25a6545a06c735ae7a4a7fc25489bdb9fbc8d5797be623982662c4a93cba2d20bfe14313ef1548eaaa691e55fabdd8e3d3e45de9ab42dc62f9a7023

    • \Users\Admin\AppData\Roaming\SubDir\Client.exe
      Filesize

      409KB

      MD5

      b70fdac25a99501e3cae11f1b775249e

      SHA1

      3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71

      SHA256

      51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246

      SHA512

      43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44

    • memory/1924-2-0x0000000074B60000-0x000000007524E000-memory.dmp
      Filesize

      6.9MB

    • memory/1924-0-0x0000000074B6E000-0x0000000074B6F000-memory.dmp
      Filesize

      4KB

    • memory/1924-1-0x00000000009B0000-0x0000000000A1C000-memory.dmp
      Filesize

      432KB

    • memory/1924-13-0x0000000074B60000-0x000000007524E000-memory.dmp
      Filesize

      6.9MB

    • memory/2704-16-0x0000000074B60000-0x000000007524E000-memory.dmp
      Filesize

      6.9MB

    • memory/2704-11-0x0000000074B60000-0x000000007524E000-memory.dmp
      Filesize

      6.9MB

    • memory/2704-10-0x0000000000240000-0x00000000002AC000-memory.dmp
      Filesize

      432KB

    • memory/2704-12-0x0000000074B60000-0x000000007524E000-memory.dmp
      Filesize

      6.9MB

    • memory/2704-15-0x0000000074B60000-0x000000007524E000-memory.dmp
      Filesize

      6.9MB

    • memory/2704-1028-0x0000000074B60000-0x000000007524E000-memory.dmp
      Filesize

      6.9MB