Analysis

  • max time kernel
    155s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2024 15:47

General

  • Target

    IncognitoExecutorPro.exe

  • Size

    10.1MB

  • MD5

    31bf96839daa9a6040bc08cdb08a14fb

  • SHA1

    61b1b04ad917615bba369b269792df863c12658e

  • SHA256

    2760a9f7cf2f6173b214a2309e2875a4ee1b6d301e2781ed1033dfbdc367e059

  • SHA512

    f369cdf20cb44b0824f9a9ad2ade55c2eb068074af6470700d526a24f7b738062de67e7f05ee40a0641c5f193769502d59dd5167a4cf0e8f9c6f01ebeeddf56a

  • SSDEEP

    196608:y6wZYKg9Sw7sghUuE1R1R9iVTdRUo/Rf7KG0ZLK+4eCA6Pt7R:5kwDh10RsFzUURTclC5t7

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

0.tcp.eu.ngrok.io:14456

Mutex

2aabc0d2-2673-4473-9d8e-30b4863e718a

Attributes
  • encryption_key

    91137B461EAD4C8D03DB7ED595191162855E87F2

  • install_name

    DRIVER32.exe

  • log_directory

    Logs

  • reconnect_delay

    1000

  • startup_key

    DRIVER32

  • subdirectory

    SYSWOW

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 17 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\IncognitoExecutorPro.exe
    "C:\Users\Admin\AppData\Local\Temp\IncognitoExecutorPro.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Users\Admin\AppData\Local\Temp\INCOGNITOEXEC.EXE
      "C:\Users\Admin\AppData\Local\Temp\INCOGNITOEXEC.EXE"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "DRIVER32" /sc ONLOGON /tr "C:\Windows\system32\SYSWOW\DRIVER32.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2176
      • C:\Windows\system32\SYSWOW\DRIVER32.exe
        "C:\Windows\system32\SYSWOW\DRIVER32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3540
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "DRIVER32" /sc ONLOGON /tr "C:\Windows\system32\SYSWOW\DRIVER32.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:4308
    • C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXE
      "C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\test.exe
        "C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c title Incognito v1.0.0b - public
          4⤵
            PID:1264
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2300

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Scheduled Task/Job

      1
      T1053

      Persistence

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Scheduled Task/Job

      1
      T1053

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\INCOGNITOEXEC.EXE
        Filesize

        3.1MB

        MD5

        8a1bea902cd41d9d01b105daea8bc646

        SHA1

        034680adb1168f398801b02e919dc8a5a5dc39a0

        SHA256

        89ecbadbbeadf5e68d13e5ba7ab917d4829e684333e096cbb0d3550a08688418

        SHA512

        e8c5fbb6caedc2cfb34a53b10509722d1b04da592993a630c878a61d0bbee7c8afe779caa6d2307eac117110d38277da6ffa7f9353b08c4fb6b81e03c62587fb

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\VCRUNTIME140_1.dll
        Filesize

        37KB

        MD5

        75e78e4bf561031d39f86143753400ff

        SHA1

        324c2a99e39f8992459495182677e91656a05206

        SHA256

        1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e

        SHA512

        ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_bz2.pyd
        Filesize

        81KB

        MD5

        4101128e19134a4733028cfaafc2f3bb

        SHA1

        66c18b0406201c3cfbba6e239ab9ee3dbb3be07d

        SHA256

        5843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80

        SHA512

        4f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd
        Filesize

        120KB

        MD5

        6a9ca97c039d9bbb7abf40b53c851198

        SHA1

        01bcbd134a76ccd4f3badb5f4056abedcff60734

        SHA256

        e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535

        SHA512

        dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_lzma.pyd
        Filesize

        154KB

        MD5

        337b0e65a856568778e25660f77bc80a

        SHA1

        4d9e921feaee5fa70181eba99054ffa7b6c9bb3f

        SHA256

        613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a

        SHA512

        19e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd
        Filesize

        76KB

        MD5

        8140bdc5803a4893509f0e39b67158ce

        SHA1

        653cc1c82ba6240b0186623724aec3287e9bc232

        SHA256

        39715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769

        SHA512

        d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dll
        Filesize

        34KB

        MD5

        32d36d2b0719db2b739af803c5e1c2f5

        SHA1

        023c4f1159a2a05420f68daf939b9ac2b04ab082

        SHA256

        128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c

        SHA512

        a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\psutil\_psutil_windows.pyd
        Filesize

        65KB

        MD5

        3cba71b6bc59c26518dc865241add80a

        SHA1

        7e9c609790b1de110328bbbcbb4cd09b7150e5bd

        SHA256

        e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996

        SHA512

        3ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\pywintypes311.dll
        Filesize

        131KB

        MD5

        90b786dc6795d8ad0870e290349b5b52

        SHA1

        592c54e67cf5d2d884339e7a8d7a21e003e6482f

        SHA256

        89f2a5c6be1e70b3d895318fdd618506b8c0e9a63b6a1a4055dff4abdc89f18a

        SHA512

        c6e1dbf25d260c723a26c88ec027d40d47f5e28fc9eb2dbc72a88813a1d05c7f75616b31836b68b87df45c65eef6f3eaed2a9f9767f9e2f12c45f672c2116e72

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd
        Filesize

        28KB

        MD5

        97ee623f1217a7b4b7de5769b7b665d6

        SHA1

        95b918f3f4c057fb9c878c8cc5e502c0bd9e54c0

        SHA256

        0046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790

        SHA512

        20edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32api.pyd
        Filesize

        130KB

        MD5

        1d6762b494dc9e60ca95f7238ae1fb14

        SHA1

        aa0397d96a0ed41b2f03352049dafe040d59ad5d

        SHA256

        fae5323e2119a8f678055f4244177b5806c7b6b171b1945168f685631b913664

        SHA512

        0b561f651161a34c37ff8d115f154c52202f573d049681f8cdd7bba2e966bb8203780c19ba824b4a693ef12ef1eeef6aeeef96eb369e4b6129f1deb6b26aaa00

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32gui.pyd
        Filesize

        212KB

        MD5

        3c81c0ceebb2b5c224a56c024021efad

        SHA1

        aee4ddcc136856ed2297d7dbdc781a266cf7eab9

        SHA256

        6085bc00a1f157c4d2cc0609e20e1e20d2572fe6498de3bec4c9c7bebcfbb629

        SHA512

        f2d6c06da4f56a8119a931b5895c446432152737b4a7ae95c2b91b1638e961da78833728d62e206e1d886e7c36d7bed3fa4403d0b57a017523dd831dd6b7117f

      • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32process.pyd
        Filesize

        52KB

        MD5

        936b26a67e6c7788c3a5268f478e01b8

        SHA1

        0ee92f0a97a14fcd45865667ed02b278794b2fdf

        SHA256

        0459439ef3efa0e0fc2b8ca3f0245826e9bbd7e8f3266276398921a4aa899fbd

        SHA512

        bfe37390da24cc9422cabbbbbc7733d89f61d73ecc3765fe494b5a7bd044e4ffb629f1bb4a28437fe9ad169ae65f2338c15d689f381f9e745c44f2741388860b

      • C:\Users\Admin\AppData\Local\Temp\SIGMAHACKS0.2.EXE
        Filesize

        6.9MB

        MD5

        10bbd38c21ebf84fea97c3812d57d9c6

        SHA1

        293cec0d7f44151ffbf88dfe408265825f8bca9b

        SHA256

        83c4e5947870b7b9f06044624b420ddc9fbae6898a5c9b4420c3dbeaca508bb9

        SHA512

        a00ec8ed84b806c4aca8564354a6687da64b999d255df7fea4c38e6026c8a4cee665414e96d5e28904d051f4c1a6956193a96c12e52286d6d7f58f39bae8ac31

      • C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\VCRUNTIME140.dll
        Filesize

        96KB

        MD5

        f12681a472b9dd04a812e16096514974

        SHA1

        6fd102eb3e0b0e6eef08118d71f28702d1a9067c

        SHA256

        d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

        SHA512

        7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

      • C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\python3.dll
        Filesize

        64KB

        MD5

        34e49bb1dfddf6037f0001d9aefe7d61

        SHA1

        a25a39dca11cdc195c9ecd49e95657a3e4fe3215

        SHA256

        4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281

        SHA512

        edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

      • C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\python311.dll
        Filesize

        5.5MB

        MD5

        9a24c8c35e4ac4b1597124c1dcbebe0f

        SHA1

        f59782a4923a30118b97e01a7f8db69b92d8382a

        SHA256

        a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7

        SHA512

        9d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b

      • C:\Users\Admin\AppData\Local\Temp\onefile_1948_133619033666221513\test.exe
        Filesize

        9.6MB

        MD5

        5244aa93f4209963f6c63e1ef9dde0b9

        SHA1

        642219eec726127fe7fbe9ceb5e223dcf46fbe46

        SHA256

        aeca166d5d3da9e76957686ca8753e95b930d8508f825f3cc6b4bac28da6e142

        SHA512

        e510165f98b070ad3c202734833230779fd95585d28b0a9873afbb5022f488c85e935b7f366a92b89449b42106f4ed76997cac16994386560bd45021d368e28c

      • memory/3280-43-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmp
        Filesize

        10.8MB

      • memory/3280-17-0x0000000000B20000-0x0000000000E44000-memory.dmp
        Filesize

        3.1MB

      • memory/3280-11-0x00007FF9D5CB3000-0x00007FF9D5CB5000-memory.dmp
        Filesize

        8KB

      • memory/3280-84-0x00007FF9D5CB0000-0x00007FF9D6771000-memory.dmp
        Filesize

        10.8MB

      • memory/3540-92-0x000000001B9F0000-0x000000001BA40000-memory.dmp
        Filesize

        320KB

      • memory/3540-93-0x000000001BB00000-0x000000001BBB2000-memory.dmp
        Filesize

        712KB