Analysis

  • max time kernel
    597s
  • max time network
    606s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 15:28

General

  • Target

    uni/Uni - Copy (12) - Copy - Copy - Copy.exe

  • Size

    409KB

  • MD5

    b70fdac25a99501e3cae11f1b775249e

  • SHA1

    3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71

  • SHA256

    51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246

  • SHA512

    43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44

  • SSDEEP

    12288:gpbJjGut6AoE3hVVdFaC/eZPTMTDlpgfJCKuMsVs:oVaurMLcDlpRKai

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

panel-slave.gl.at.ply.gg:57059

panel-slave.gl.at.ply.gg:27892

Mutex

$Sxr-rpL8EItHN3pqIQQVy2

Attributes
  • encryption_key

    Lme7VBS3l58VwLM69PNM

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 10 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 9 IoCs
  • Looks up external IP address via web service 20 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:2636
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2508
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\ABb84DOYnXso.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:1912
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 10 localhost
            4⤵
            • Runs ping.exe
            PID:1852
          • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2044
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:1536
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\5mxgQoIo3Fmp.bat" "
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:748
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                6⤵
                  PID:296
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • Runs ping.exe
                  PID:1948
                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2160
                  • C:\Windows\SysWOW64\schtasks.exe
                    "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                    7⤵
                    • Creates scheduled task(s)
                    PID:2648
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\CSyqmV4c8OW2.bat" "
                    7⤵
                    • Loads dropped DLL
                    PID:2568
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 65001
                      8⤵
                        PID:2564
                      • C:\Windows\SysWOW64\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • Runs ping.exe
                        PID:2540
                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2880
                        • C:\Windows\SysWOW64\schtasks.exe
                          "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                          9⤵
                          • Creates scheduled task(s)
                          PID:1952
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\mtotvgM5D2RX.bat" "
                          9⤵
                          • Loads dropped DLL
                          PID:1364
                          • C:\Windows\SysWOW64\chcp.com
                            chcp 65001
                            10⤵
                              PID:852
                            • C:\Windows\SysWOW64\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • Runs ping.exe
                              PID:1768
                            • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                              "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2692
                              • C:\Windows\SysWOW64\schtasks.exe
                                "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                11⤵
                                • Creates scheduled task(s)
                                PID:1068
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\Ci79qxL5ADQk.bat" "
                                11⤵
                                • Loads dropped DLL
                                PID:948
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 65001
                                  12⤵
                                    PID:744
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping -n 10 localhost
                                    12⤵
                                    • Runs ping.exe
                                    PID:1868
                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                    "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1008
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                      13⤵
                                      • Creates scheduled task(s)
                                      PID:2680
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\AKIQzIPfvj1f.bat" "
                                      13⤵
                                      • Loads dropped DLL
                                      PID:2940
                                      • C:\Windows\SysWOW64\chcp.com
                                        chcp 65001
                                        14⤵
                                          PID:2752
                                        • C:\Windows\SysWOW64\PING.EXE
                                          ping -n 10 localhost
                                          14⤵
                                          • Runs ping.exe
                                          PID:2788
                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                          14⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1800
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                            15⤵
                                            • Creates scheduled task(s)
                                            PID:1780
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\uJ8B701R2yzN.bat" "
                                            15⤵
                                            • Loads dropped DLL
                                            PID:3064
                                            • C:\Windows\SysWOW64\chcp.com
                                              chcp 65001
                                              16⤵
                                                PID:1700
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping -n 10 localhost
                                                16⤵
                                                • Runs ping.exe
                                                PID:2672
                                              • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                16⤵
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2508
                                                • C:\Windows\SysWOW64\schtasks.exe
                                                  "schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                  17⤵
                                                  • Creates scheduled task(s)
                                                  PID:2076
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\51y4FSyZdvQU.bat" "
                                                  17⤵
                                                  • Loads dropped DLL
                                                  PID:1100
                                                  • C:\Windows\SysWOW64\chcp.com
                                                    chcp 65001
                                                    18⤵
                                                      PID:2284
                                                    • C:\Windows\SysWOW64\PING.EXE
                                                      ping -n 10 localhost
                                                      18⤵
                                                      • Runs ping.exe
                                                      PID:2608
                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                      18⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1308
                    • C:\Windows\SysWOW64\SCHTASKS.exe
                      "SCHTASKS.exe" /create /tn "$77Uni - Copy (12) - Copy - Copy - Copy.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\uni\Uni - Copy (12) - Copy - Copy - Copy.exe'" /sc onlogon /rl HIGHEST
                      2⤵
                      • Creates scheduled task(s)
                      PID:2484

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Execution

                  Scheduled Task/Job

                  1
                  T1053

                  Persistence

                  Scheduled Task/Job

                  1
                  T1053

                  Privilege Escalation

                  Scheduled Task/Job

                  1
                  T1053

                  Discovery

                  System Information Discovery

                  1
                  T1082

                  Remote System Discovery

                  1
                  T1018

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\51y4FSyZdvQU.bat
                    Filesize

                    207B

                    MD5

                    c928175b68f6998e28a2ede8a0112de9

                    SHA1

                    11b1514d03abeb4007e9526ab535ec5450b93ef2

                    SHA256

                    e4712745fd3a27d3a3aae163febe632b8f890f0add58ece8c3b96baef0c79992

                    SHA512

                    3c81b63e80a447fb09621fd8040bcdcbe90fc88228374b1cbf860c6d7cceb88c89e0cdd4defed5aa5c5c90362105a88986a2e4cf70d5107f745b3ddf32673b9d

                  • C:\Users\Admin\AppData\Local\Temp\5mxgQoIo3Fmp.bat
                    Filesize

                    207B

                    MD5

                    96f66fd1962f14a7a9a7e96b27350424

                    SHA1

                    3032f892e23da188f307ce9c45a691c8428944b9

                    SHA256

                    60e1f38c1f2d05aac360fa11305afcd51f9da20000b47589a4526cdb359fa5d3

                    SHA512

                    d6e45b8a9aae7621f00801214f1de4381d42533164508dbbcd0ebb7b6bd864a21c54ce5678169d5ec9fee4d4bcb901c19a28b5893c63fd381df7b660161b42b4

                  • C:\Users\Admin\AppData\Local\Temp\ABb84DOYnXso.bat
                    Filesize

                    207B

                    MD5

                    d0890a2f0428af375715a5686715e46c

                    SHA1

                    cf5266dc2642040558daf1edea5a7e98aecfb5e1

                    SHA256

                    bc64e12863350ea14d30e848293b0c4aa3effd35783c57002e7525bed7404702

                    SHA512

                    4b7c5f1ffb7cc43dc5397acc157e8cc31cc34d7be781da89f5163f132580ecacca689df77a1a2003858d80b8ee112455204913048111a1fa4f3ec3a93dc01fbb

                  • C:\Users\Admin\AppData\Local\Temp\AKIQzIPfvj1f.bat
                    Filesize

                    207B

                    MD5

                    50bb7cfbd38988d8cbcea48a0764d1ca

                    SHA1

                    4b354d2ca3babd86fbec39f0ecd3abcb424d6052

                    SHA256

                    e4de3015903eec1a7ce09359d32b4401e79d259e4dff359b37788f40716390d3

                    SHA512

                    6848e45bac948266315a7b8c7f8742a0a3c05b9970ffa021e9ea8601e806af335dcc376af832af8ac2fe34cea4bfff5b580cf26e7d6dfe5185508979df305663

                  • C:\Users\Admin\AppData\Local\Temp\CSyqmV4c8OW2.bat
                    Filesize

                    207B

                    MD5

                    75d36ae74ba5b6dd83c43c3dbc458c0e

                    SHA1

                    ec68c38e5d191be56ec84e6aed2dcde73ced7dbd

                    SHA256

                    dace719784c5a04d25d469139860e766e89c0642ec29d232fad316ebfa09b7d0

                    SHA512

                    685978ab0dbeced334a16c57536c045ca94a8b381b74a6b10016d62097c84e48ff6b8f44669d30998f028e1d6f9863ed62bf8d39dff4ee71147d69cc73ac0d92

                  • C:\Users\Admin\AppData\Local\Temp\Ci79qxL5ADQk.bat
                    Filesize

                    207B

                    MD5

                    e369989587ed36c38774b9bfa06b2ed3

                    SHA1

                    ab979d4a0680bcbe2006fa07f73a8cfb8cb198c8

                    SHA256

                    3218e81c77544742098cc2cea013a4f522599165306b21d96163dab450aacd4e

                    SHA512

                    32f7b5b026043cad8224ce36d6b95dedc0c212bfe397ec11fe45ac18aa9b1a3081cb0a89219475a93f22b5092676dce7a066a8a2ca53c4855b4ad507f8d313f7

                  • C:\Users\Admin\AppData\Local\Temp\mtotvgM5D2RX.bat
                    Filesize

                    207B

                    MD5

                    c21bc67654e0fc33e8b48ca87e1a3f9d

                    SHA1

                    3658903873e34f66759a580864abf8277e2689f6

                    SHA256

                    11ee2a7dc4309bb457a8c0528717ed7f49a37447cd26155648b7bb123a6013c8

                    SHA512

                    f7b4471e1e4836ae7b3bfdf3654f14f4a48ac8f638b5415bbabe71791bdffebdfa3e864f653abedf8b7f8bf95558a68e5a0e79eb469063b2202307344aa09853

                  • C:\Users\Admin\AppData\Local\Temp\uJ8B701R2yzN.bat
                    Filesize

                    207B

                    MD5

                    faae5ddbf1d1aa56bdbf8aec42be9969

                    SHA1

                    8fa36fc36319a45e7b847739295a153ee2392a44

                    SHA256

                    1b08f51c758c4f12b58f4789c41c22f84a622d7260b58b596d5541b3f32e4416

                    SHA512

                    0bded1b0e2af0a151c58e702b80a415a9235355725fe7b987d5a2f947926f7bace2f775ab94aedb3c6043050fe5a339ad24fc07ca4c9f6f2b3880204f85bb0fb

                  • \Users\Admin\AppData\Roaming\SubDir\Client.exe
                    Filesize

                    409KB

                    MD5

                    b70fdac25a99501e3cae11f1b775249e

                    SHA1

                    3c59226479bfdcd1b2927bcfb1a7516d4cb8dd71

                    SHA256

                    51ff3eb450a786c1aaa75ff889f2fd256412a7b75d04277fdf9fcccc20e57246

                    SHA512

                    43f0d5d6e5f0d5febba537c109ffdbc250bbb6e9725e635a43ec975b0353048eaeee50b6e9274cd5e072ea6b0cea32439bd37408b2528832f467f2075f74ca44

                  • memory/1008-76-0x0000000000070000-0x00000000000DC000-memory.dmp
                    Filesize

                    432KB

                  • memory/1308-112-0x0000000000090000-0x00000000000FC000-memory.dmp
                    Filesize

                    432KB

                  • memory/1800-88-0x0000000000CB0000-0x0000000000D1C000-memory.dmp
                    Filesize

                    432KB

                  • memory/2044-29-0x0000000001050000-0x00000000010BC000-memory.dmp
                    Filesize

                    432KB

                  • memory/2160-41-0x0000000001050000-0x00000000010BC000-memory.dmp
                    Filesize

                    432KB

                  • memory/2508-100-0x0000000000CB0000-0x0000000000D1C000-memory.dmp
                    Filesize

                    432KB

                  • memory/2532-26-0x0000000074190000-0x000000007487E000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/2532-16-0x0000000074190000-0x000000007487E000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/2532-14-0x0000000074190000-0x000000007487E000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/2532-12-0x0000000000930000-0x000000000099C000-memory.dmp
                    Filesize

                    432KB

                  • memory/2532-13-0x0000000074190000-0x000000007487E000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/2692-64-0x00000000003C0000-0x000000000042C000-memory.dmp
                    Filesize

                    432KB

                  • memory/2984-0-0x000000007419E000-0x000000007419F000-memory.dmp
                    Filesize

                    4KB

                  • memory/2984-15-0x0000000074190000-0x000000007487E000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/2984-4-0x0000000074190000-0x000000007487E000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/2984-3-0x000000007419E000-0x000000007419F000-memory.dmp
                    Filesize

                    4KB

                  • memory/2984-2-0x0000000074190000-0x000000007487E000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/2984-1-0x00000000009B0000-0x0000000000A1C000-memory.dmp
                    Filesize

                    432KB