Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 15:47
Behavioral task
behavioral1
Sample
IncognitoExecutorPro.exe
Resource
win7-20240221-en
General
-
Target
IncognitoExecutorPro.exe
-
Size
10.1MB
-
MD5
31bf96839daa9a6040bc08cdb08a14fb
-
SHA1
61b1b04ad917615bba369b269792df863c12658e
-
SHA256
2760a9f7cf2f6173b214a2309e2875a4ee1b6d301e2781ed1033dfbdc367e059
-
SHA512
f369cdf20cb44b0824f9a9ad2ade55c2eb068074af6470700d526a24f7b738062de67e7f05ee40a0641c5f193769502d59dd5167a4cf0e8f9c6f01ebeeddf56a
-
SSDEEP
196608:y6wZYKg9Sw7sghUuE1R1R9iVTdRUo/Rf7KG0ZLK+4eCA6Pt7R:5kwDh10RsFzUURTclC5t7
Malware Config
Extracted
quasar
1.4.1
Office04
0.tcp.eu.ngrok.io:14456
2aabc0d2-2673-4473-9d8e-30b4863e718a
-
encryption_key
91137B461EAD4C8D03DB7ED595191162855E87F2
-
install_name
DRIVER32.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
DRIVER32
-
subdirectory
SYSWOW
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\INCOGNITOEXEC.EXE family_quasar behavioral2/memory/3280-17-0x0000000000B20000-0x0000000000E44000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
IncognitoExecutorPro.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation IncognitoExecutorPro.exe -
Executes dropped EXE 4 IoCs
Processes:
INCOGNITOEXEC.EXESIGMAHACKS0.2.EXEtest.exeDRIVER32.exepid process 3280 INCOGNITOEXEC.EXE 1948 SIGMAHACKS0.2.EXE 2996 test.exe 3540 DRIVER32.exe -
Loads dropped DLL 17 IoCs
Processes:
test.exepid process 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe 2996 test.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Drops file in System32 directory 2 IoCs
Processes:
INCOGNITOEXEC.EXEdescription ioc process File created C:\Windows\system32\SYSWOW\DRIVER32.exe INCOGNITOEXEC.EXE File opened for modification C:\Windows\system32\SYSWOW\DRIVER32.exe INCOGNITOEXEC.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2176 schtasks.exe 4308 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
INCOGNITOEXEC.EXEtest.exeDRIVER32.exedescription pid process Token: SeDebugPrivilege 3280 INCOGNITOEXEC.EXE Token: SeDebugPrivilege 2996 test.exe Token: SeDebugPrivilege 3540 DRIVER32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
IncognitoExecutorPro.exeSIGMAHACKS0.2.EXEtest.exeINCOGNITOEXEC.EXEDRIVER32.exedescription pid process target process PID 3352 wrote to memory of 3280 3352 IncognitoExecutorPro.exe INCOGNITOEXEC.EXE PID 3352 wrote to memory of 3280 3352 IncognitoExecutorPro.exe INCOGNITOEXEC.EXE PID 3352 wrote to memory of 1948 3352 IncognitoExecutorPro.exe SIGMAHACKS0.2.EXE PID 3352 wrote to memory of 1948 3352 IncognitoExecutorPro.exe SIGMAHACKS0.2.EXE PID 1948 wrote to memory of 2996 1948 SIGMAHACKS0.2.EXE test.exe PID 1948 wrote to memory of 2996 1948 SIGMAHACKS0.2.EXE test.exe PID 2996 wrote to memory of 1264 2996 test.exe cmd.exe PID 2996 wrote to memory of 1264 2996 test.exe cmd.exe PID 3280 wrote to memory of 2176 3280 INCOGNITOEXEC.EXE schtasks.exe PID 3280 wrote to memory of 2176 3280 INCOGNITOEXEC.EXE schtasks.exe PID 3280 wrote to memory of 3540 3280 INCOGNITOEXEC.EXE DRIVER32.exe PID 3280 wrote to memory of 3540 3280 INCOGNITOEXEC.EXE DRIVER32.exe PID 3540 wrote to memory of 4308 3540 DRIVER32.exe schtasks.exe PID 3540 wrote to memory of 4308 3540 DRIVER32.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\IncognitoExecutorPro.exe"C:\Users\Admin\AppData\Local\Temp\IncognitoExecutorPro.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\INCOGNITOEXEC.EXE"C:\Users\Admin\AppData\Local\Temp\INCOGNITOEXEC.EXE"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DRIVER32" /sc ONLOGON /tr "C:\Windows\system32\SYSWOW\DRIVER32.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\SYSWOW\DRIVER32.exe"C:\Windows\system32\SYSWOW\DRIVER32.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DRIVER32" /sc ONLOGON /tr "C:\Windows\system32\SYSWOW\DRIVER32.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXE"C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\test.exe"C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Incognito v1.0.0b - public4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\INCOGNITOEXEC.EXEFilesize
3.1MB
MD58a1bea902cd41d9d01b105daea8bc646
SHA1034680adb1168f398801b02e919dc8a5a5dc39a0
SHA25689ecbadbbeadf5e68d13e5ba7ab917d4829e684333e096cbb0d3550a08688418
SHA512e8c5fbb6caedc2cfb34a53b10509722d1b04da592993a630c878a61d0bbee7c8afe779caa6d2307eac117110d38277da6ffa7f9353b08c4fb6b81e03c62587fb
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\VCRUNTIME140_1.dllFilesize
37KB
MD575e78e4bf561031d39f86143753400ff
SHA1324c2a99e39f8992459495182677e91656a05206
SHA2561758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
SHA512ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_bz2.pydFilesize
81KB
MD54101128e19134a4733028cfaafc2f3bb
SHA166c18b0406201c3cfbba6e239ab9ee3dbb3be07d
SHA2565843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80
SHA5124f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pydFilesize
120KB
MD56a9ca97c039d9bbb7abf40b53c851198
SHA101bcbd134a76ccd4f3badb5f4056abedcff60734
SHA256e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535
SHA512dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_lzma.pydFilesize
154KB
MD5337b0e65a856568778e25660f77bc80a
SHA14d9e921feaee5fa70181eba99054ffa7b6c9bb3f
SHA256613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a
SHA51219e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pydFilesize
76KB
MD58140bdc5803a4893509f0e39b67158ce
SHA1653cc1c82ba6240b0186623724aec3287e9bc232
SHA25639715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769
SHA512d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dllFilesize
34KB
MD532d36d2b0719db2b739af803c5e1c2f5
SHA1023c4f1159a2a05420f68daf939b9ac2b04ab082
SHA256128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c
SHA512a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\psutil\_psutil_windows.pydFilesize
65KB
MD53cba71b6bc59c26518dc865241add80a
SHA17e9c609790b1de110328bbbcbb4cd09b7150e5bd
SHA256e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996
SHA5123ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\pywintypes311.dllFilesize
131KB
MD590b786dc6795d8ad0870e290349b5b52
SHA1592c54e67cf5d2d884339e7a8d7a21e003e6482f
SHA25689f2a5c6be1e70b3d895318fdd618506b8c0e9a63b6a1a4055dff4abdc89f18a
SHA512c6e1dbf25d260c723a26c88ec027d40d47f5e28fc9eb2dbc72a88813a1d05c7f75616b31836b68b87df45c65eef6f3eaed2a9f9767f9e2f12c45f672c2116e72
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pydFilesize
28KB
MD597ee623f1217a7b4b7de5769b7b665d6
SHA195b918f3f4c057fb9c878c8cc5e502c0bd9e54c0
SHA2560046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790
SHA51220edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32api.pydFilesize
130KB
MD51d6762b494dc9e60ca95f7238ae1fb14
SHA1aa0397d96a0ed41b2f03352049dafe040d59ad5d
SHA256fae5323e2119a8f678055f4244177b5806c7b6b171b1945168f685631b913664
SHA5120b561f651161a34c37ff8d115f154c52202f573d049681f8cdd7bba2e966bb8203780c19ba824b4a693ef12ef1eeef6aeeef96eb369e4b6129f1deb6b26aaa00
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32gui.pydFilesize
212KB
MD53c81c0ceebb2b5c224a56c024021efad
SHA1aee4ddcc136856ed2297d7dbdc781a266cf7eab9
SHA2566085bc00a1f157c4d2cc0609e20e1e20d2572fe6498de3bec4c9c7bebcfbb629
SHA512f2d6c06da4f56a8119a931b5895c446432152737b4a7ae95c2b91b1638e961da78833728d62e206e1d886e7c36d7bed3fa4403d0b57a017523dd831dd6b7117f
-
C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32process.pydFilesize
52KB
MD5936b26a67e6c7788c3a5268f478e01b8
SHA10ee92f0a97a14fcd45865667ed02b278794b2fdf
SHA2560459439ef3efa0e0fc2b8ca3f0245826e9bbd7e8f3266276398921a4aa899fbd
SHA512bfe37390da24cc9422cabbbbbc7733d89f61d73ecc3765fe494b5a7bd044e4ffb629f1bb4a28437fe9ad169ae65f2338c15d689f381f9e745c44f2741388860b
-
C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXEFilesize
6.9MB
MD510bbd38c21ebf84fea97c3812d57d9c6
SHA1293cec0d7f44151ffbf88dfe408265825f8bca9b
SHA25683c4e5947870b7b9f06044624b420ddc9fbae6898a5c9b4420c3dbeaca508bb9
SHA512a00ec8ed84b806c4aca8564354a6687da64b999d255df7fea4c38e6026c8a4cee665414e96d5e28904d051f4c1a6956193a96c12e52286d6d7f58f39bae8ac31
-
C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\VCRUNTIME140.dllFilesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\python3.dllFilesize
64KB
MD534e49bb1dfddf6037f0001d9aefe7d61
SHA1a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA2564055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856
-
C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\python311.dllFilesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\test.exeFilesize
9.6MB
MD55244aa93f4209963f6c63e1ef9dde0b9
SHA1642219eec726127fe7fbe9ceb5e223dcf46fbe46
SHA256aeca166d5d3da9e76957686ca8753e95b930d8508f825f3cc6b4bac28da6e142
SHA512e510165f98b070ad3c202734833230779fd95585d28b0a9873afbb5022f488c85e935b7f366a92b89449b42106f4ed76997cac16994386560bd45021d368e28c
-
memory/3280-43-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmpFilesize
10.8MB
-
memory/3280-17-0x0000000000B20000-0x0000000000E44000-memory.dmpFilesize
3.1MB
-
memory/3280-11-0x00007FF9D5CB3000-0x00007FF9D5CB5000-memory.dmpFilesize
8KB
-
memory/3280-84-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmpFilesize
10.8MB
-
memory/3540-92-0x000000001B9F0000-0x000000001BA40000-memory.dmpFilesize
320KB
-
memory/3540-93-0x000000001BB00000-0x000000001BBB2000-memory.dmpFilesize
712KB