Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 15:51
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
Errors
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
e3c2d0b1836b0a0986bbda8072796ab0
-
SHA1
3ba54aca2acaa078d11e189e0b9e5cf3f57ddfb9
-
SHA256
e51be2754c440078f3945070b08d88d18b0973ae44353376b92c9cc6136f17a5
-
SHA512
17fb83710814884d9a510c6e60708bf5d7981e461af4b0238520941218af92545d4b2719eefb384d745a06262f67ddc376901aecedf85a3802e61183cef27fc0
-
SSDEEP
49152:aveI22SsaNYfdPBldt698dBcjHTs1QG0+gvJ2yoGdBTHHB72eh2NT:avT22SsaNYfdPBldt6+dBcjHgg+M
Malware Config
Extracted
quasar
1.4.1
dilly
lvke-45989.portmap.host:45989
0cb49dc2-fd0d-4581-ae1e-04154c41f310
-
encryption_key
E5250226804167CB0B1B4B0E9667D0C056694DCA
-
install_name
defenderx64.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Helper
-
subdirectory
en
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1620-1-0x0000000000AA0000-0x0000000000DC4000-memory.dmp family_quasar C:\Windows\System32\en\defenderx64.exe family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
defenderx64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation defenderx64.exe -
Executes dropped EXE 1 IoCs
Processes:
defenderx64.exepid process 3664 defenderx64.exe -
Drops file in System32 directory 2 IoCs
Processes:
Client-built.exedescription ioc process File created C:\Windows\system32\en\defenderx64.exe Client-built.exe File opened for modification C:\Windows\system32\en\defenderx64.exe Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2332 schtasks.exe 2068 schtasks.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "221" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 660 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Client-built.exedefenderx64.exeshutdown.exedescription pid process Token: SeDebugPrivilege 1620 Client-built.exe Token: SeDebugPrivilege 3664 defenderx64.exe Token: SeShutdownPrivilege 1772 shutdown.exe Token: SeRemoteShutdownPrivilege 1772 shutdown.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
defenderx64.exepid process 3664 defenderx64.exe 3664 defenderx64.exe 3664 defenderx64.exe 3664 defenderx64.exe 3664 defenderx64.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
defenderx64.exepid process 3664 defenderx64.exe 3664 defenderx64.exe 3664 defenderx64.exe 3664 defenderx64.exe 3664 defenderx64.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
defenderx64.exeLogonUI.exepid process 3664 defenderx64.exe 4764 LogonUI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Client-built.exedefenderx64.exedescription pid process target process PID 1620 wrote to memory of 2332 1620 Client-built.exe schtasks.exe PID 1620 wrote to memory of 2332 1620 Client-built.exe schtasks.exe PID 1620 wrote to memory of 3664 1620 Client-built.exe defenderx64.exe PID 1620 wrote to memory of 3664 1620 Client-built.exe defenderx64.exe PID 3664 wrote to memory of 2068 3664 defenderx64.exe schtasks.exe PID 3664 wrote to memory of 2068 3664 defenderx64.exe schtasks.exe PID 3664 wrote to memory of 1772 3664 defenderx64.exe shutdown.exe PID 3664 wrote to memory of 1772 3664 defenderx64.exe shutdown.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Windows\system32\en\defenderx64.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\en\defenderx64.exe"C:\Windows\system32\en\defenderx64.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Windows\system32\en\defenderx64.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3997055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\System32\en\defenderx64.exeFilesize
3.1MB
MD5e3c2d0b1836b0a0986bbda8072796ab0
SHA13ba54aca2acaa078d11e189e0b9e5cf3f57ddfb9
SHA256e51be2754c440078f3945070b08d88d18b0973ae44353376b92c9cc6136f17a5
SHA51217fb83710814884d9a510c6e60708bf5d7981e461af4b0238520941218af92545d4b2719eefb384d745a06262f67ddc376901aecedf85a3802e61183cef27fc0
-
memory/1620-0-0x00007FF984463000-0x00007FF984465000-memory.dmpFilesize
8KB
-
memory/1620-1-0x0000000000AA0000-0x0000000000DC4000-memory.dmpFilesize
3.1MB
-
memory/1620-2-0x00007FF984460000-0x00007FF984F21000-memory.dmpFilesize
10.8MB
-
memory/1620-8-0x00007FF984460000-0x00007FF984F21000-memory.dmpFilesize
10.8MB
-
memory/3664-10-0x00007FF984460000-0x00007FF984F21000-memory.dmpFilesize
10.8MB
-
memory/3664-9-0x00007FF984460000-0x00007FF984F21000-memory.dmpFilesize
10.8MB
-
memory/3664-11-0x000000001CAB0000-0x000000001CB00000-memory.dmpFilesize
320KB
-
memory/3664-12-0x000000001CBC0000-0x000000001CC72000-memory.dmpFilesize
712KB
-
memory/3664-15-0x000000001CB40000-0x000000001CB52000-memory.dmpFilesize
72KB
-
memory/3664-16-0x000000001D7C0000-0x000000001D7FC000-memory.dmpFilesize
240KB
-
memory/3664-17-0x00007FF984460000-0x00007FF984F21000-memory.dmpFilesize
10.8MB
-
memory/3664-18-0x00007FF984460000-0x00007FF984F21000-memory.dmpFilesize
10.8MB
-
memory/3664-19-0x000000001F0D0000-0x000000001F5F8000-memory.dmpFilesize
5.2MB
-
memory/3664-23-0x00007FF984460000-0x00007FF984F21000-memory.dmpFilesize
10.8MB