Analysis
-
max time kernel
3s -
max time network
8s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 01:44
Behavioral task
behavioral1
Sample
2lz.exe
Resource
win7-20240611-en
Errors
General
-
Target
2lz.exe
-
Size
5.9MB
-
MD5
12f9b68ed66fed9a1e3c1c2319c837c6
-
SHA1
e423cbd003c718b6fa268de83806dae6a9fe88c3
-
SHA256
7c5919ffcd3234d3c520120fbbeb9204e11ca3adfbfc175175a1e087492cbbba
-
SHA512
b649639d2363f135f694f8d5968a6b7adabd76ef793a3fb9313b1c142a0e749be33a5831c4d0cbc32ea170a2100f693755b378280f252dd50bd1ddf008b1ba53
-
SSDEEP
98304:pMI+LjNr86mjj/UYviu26bbyKS2myX0rPgIh:p8Vmj72wblTmyEgG
Malware Config
Extracted
quasar
2.1.0.0
windows security
quasarrat220-24487.portmap.io:24487
VNM_MUTEX_mOPqShedZxvAqgLrWL
-
encryption_key
7mvA2TfKjvMIY0zZeMKF
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x0008000000023511-14.dat disable_win_def behavioral2/memory/752-24-0x0000000000720000-0x00000000007AC000-memory.dmp disable_win_def -
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023511-14.dat family_quasar behavioral2/memory/752-24-0x0000000000720000-0x00000000007AC000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 2lz.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation WINDOWS SECURITY.EXE -
Executes dropped EXE 2 IoCs
pid Process 1256 PAYPAL.EXE 752 WINDOWS SECURITY.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2444 752 WerFault.exe 82 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 440 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2140 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 752 WINDOWS SECURITY.EXE Token: SeDebugPrivilege 752 WINDOWS SECURITY.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1256 PAYPAL.EXE 752 WINDOWS SECURITY.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4788 wrote to memory of 1256 4788 2lz.exe 80 PID 4788 wrote to memory of 1256 4788 2lz.exe 80 PID 4788 wrote to memory of 1256 4788 2lz.exe 80 PID 4788 wrote to memory of 752 4788 2lz.exe 82 PID 4788 wrote to memory of 752 4788 2lz.exe 82 PID 4788 wrote to memory of 752 4788 2lz.exe 82 PID 752 wrote to memory of 440 752 WINDOWS SECURITY.EXE 86 PID 752 wrote to memory of 440 752 WINDOWS SECURITY.EXE 86 PID 752 wrote to memory of 440 752 WINDOWS SECURITY.EXE 86 PID 752 wrote to memory of 4728 752 WINDOWS SECURITY.EXE 88 PID 752 wrote to memory of 4728 752 WINDOWS SECURITY.EXE 88 PID 752 wrote to memory of 4728 752 WINDOWS SECURITY.EXE 88 PID 4728 wrote to memory of 3392 4728 cmd.exe 92 PID 4728 wrote to memory of 3392 4728 cmd.exe 92 PID 4728 wrote to memory of 3392 4728 cmd.exe 92 PID 4728 wrote to memory of 2140 4728 cmd.exe 93 PID 4728 wrote to memory of 2140 4728 cmd.exe 93 PID 4728 wrote to memory of 2140 4728 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2lz.exe"C:\Users\Admin\AppData\Local\Temp\2lz.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\PAYPAL.EXE"C:\Users\Admin\AppData\Local\Temp\PAYPAL.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\WINDOWS SECURITY.EXE"C:\Users\Admin\AppData\Local\Temp\WINDOWS SECURITY.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Venom Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\WINDOWS SECURITY.EXE" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lIrAszgooOKF.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3392
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:2140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 22163⤵
- Program crash
PID:2444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 752 -ip 7521⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5341b34b571af06277c2f3b4156bd86df
SHA1ba120240400cc6dcf0e92e732d4f460f3763102b
SHA2569a579053ee79c9ee45e29ac1887aba8cb87936c01026b5f3d830456547adc441
SHA5122cbb482d2e087e18b7461c9a317aa249adf12821de17d6dd59f3c17e01394047df31e875a551d23d32a64a46f8db46003c2feced7e967dd159bc65d3bff76e66
-
Filesize
534KB
MD59e14775490cee79c73cb45c2f24f7a73
SHA1ddd6c7485a5e64a66a0a7598777abdafa7a63950
SHA256d53df5b6b080ba24773ca16c7a8b70eeb783ead278712e0c5b44abc84805e60e
SHA5121c0aec61a64400bcf18f6f0e5a950c68b7a25492b07290e3793a759f616c1b361ed6472d260d0f379b691567216a1f9e53af53b2dc89711df618a4463c8d0317
-
Filesize
213B
MD5622195b0d39ba14627e894525a3a3285
SHA1f10d39eacf6fb130f0b096f9fa1fab3830779abf
SHA256a283f47cf0f21adfa3c9cbf805572e2be4423ca3e1d5a23eb11ce1f6d1e9b537
SHA512f3e49f28515c13c59a5eabb69589105cd60105c0da57404e96260d7877cec10587f01bc7709fc4c60828fefba4d49da0b10dd9be66b74ff7d3c2e26a7018aaf0