Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11-06-2024 17:13
Behavioral task
behavioral1
Sample
$sxr-Uni.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
$sxr-Uni.exe
Resource
win10v2004-20240508-en
General
-
Target
$sxr-Uni.exe
-
Size
349KB
-
MD5
1ec86aa544089409730a3777da35c70a
-
SHA1
b592008ecc06d47bd7170f0ad3799e114139df0f
-
SHA256
5d533976a3ac74eede22a42c2776ce3a392596b98c5ef0e6bed98b6395fb0c48
-
SHA512
fbd7a000b74f0488039aa9213d56cf464b55629c9c649bde2835216f699f51f921d417d090e7e2e0d6e7c10a07c4b767ada82a8ac45fcfc10c950163f2df9715
-
SSDEEP
6144:ErL3HRsM+OFZHBcFU4EljaWbrqXMxxz5A8XklSoj:6VP+MXuCJayqXMr5mlSoj
Malware Config
Extracted
quasar
3.0.0
Slave
runderscore00-63294.portmap.host:63294
QSR_MUTEX_zImH6b2ccpa3QdeboZ
-
encryption_key
Ep14qTjvhc0fuqxF9hv4
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3328-1-0x0000000000530000-0x000000000058E000-memory.dmp family_quasar behavioral1/files/0x000800000001ac41-11.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4528 $sxr-powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3932 schtasks.exe 1560 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3328 $sxr-Uni.exe Token: SeDebugPrivilege 4528 $sxr-powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4528 $sxr-powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3932 3328 $sxr-Uni.exe 74 PID 3328 wrote to memory of 3932 3328 $sxr-Uni.exe 74 PID 3328 wrote to memory of 3932 3328 $sxr-Uni.exe 74 PID 3328 wrote to memory of 4528 3328 $sxr-Uni.exe 76 PID 3328 wrote to memory of 4528 3328 $sxr-Uni.exe 76 PID 3328 wrote to memory of 4528 3328 $sxr-Uni.exe 76 PID 4528 wrote to memory of 1560 4528 $sxr-powershell.exe 77 PID 4528 wrote to memory of 1560 4528 $sxr-powershell.exe 77 PID 4528 wrote to memory of 1560 4528 $sxr-powershell.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\$sxr-Uni.exe"C:\Users\Admin\AppData\Local\Temp\$sxr-Uni.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\$sxr-Uni.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3932
-
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD51ec86aa544089409730a3777da35c70a
SHA1b592008ecc06d47bd7170f0ad3799e114139df0f
SHA2565d533976a3ac74eede22a42c2776ce3a392596b98c5ef0e6bed98b6395fb0c48
SHA512fbd7a000b74f0488039aa9213d56cf464b55629c9c649bde2835216f699f51f921d417d090e7e2e0d6e7c10a07c4b767ada82a8ac45fcfc10c950163f2df9715