Analysis
-
max time kernel
127s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
LyphaBuilder.exe
Resource
win7-20240221-en
General
-
Target
LyphaBuilder.exe
-
Size
1.3MB
-
MD5
51bacfc2db65bb01e860893dd01c57bc
-
SHA1
1499f3ba3f3cbdc3e4db3aff5d15cb38c5cfebd5
-
SHA256
7915d96fd92766003b73b58c3e9b375487479b9b582ed3be8a88bf5fed8a8208
-
SHA512
9e93171d3118f192f60e5b52fea67a66a3eca1ab23230da44c1a1ce80119c642ba65f61eee32afe6cec8fbe0a7fd5176cea9fdff9e3917a26114a3d11d33cb66
-
SSDEEP
24576:OeZa7DEThQ6Cyn2OV7s+y1SXHNC0ssga+R6bcj+RZuQHWi3F//vxy6omL2:d8ETq6CyVA+y1I40ROIbNB2YFpPomL
Malware Config
Extracted
quasar
1.4.1
Remcos
team-circles.gl.at.ply.gg:25349
109bae44-c7e4-46f2-82cd-2c3efb4dc47e
-
encryption_key
78AF43F549EE55D0FC30D38EC96EAA6F3A3F5CDF
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
WD Defender
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe family_quasar behavioral1/memory/2872-15-0x00000000008A0000-0x0000000000BC4000-memory.dmp family_quasar behavioral1/memory/1700-22-0x0000000000EA0000-0x00000000011C4000-memory.dmp family_quasar -
Executes dropped EXE 3 IoCs
Processes:
Lypha-Builder.exeRuntime Broker.exeRuntime Broker.exepid process 3060 Lypha-Builder.exe 2872 Runtime Broker.exe 1700 Runtime Broker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2644 schtasks.exe 2700 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Runtime Broker.exeRuntime Broker.exedescription pid process Token: SeDebugPrivilege 2872 Runtime Broker.exe Token: SeDebugPrivilege 1700 Runtime Broker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Runtime Broker.exepid process 1700 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
LyphaBuilder.exeRuntime Broker.exeRuntime Broker.exedescription pid process target process PID 2880 wrote to memory of 3060 2880 LyphaBuilder.exe Lypha-Builder.exe PID 2880 wrote to memory of 3060 2880 LyphaBuilder.exe Lypha-Builder.exe PID 2880 wrote to memory of 3060 2880 LyphaBuilder.exe Lypha-Builder.exe PID 2880 wrote to memory of 2872 2880 LyphaBuilder.exe Runtime Broker.exe PID 2880 wrote to memory of 2872 2880 LyphaBuilder.exe Runtime Broker.exe PID 2880 wrote to memory of 2872 2880 LyphaBuilder.exe Runtime Broker.exe PID 2872 wrote to memory of 2644 2872 Runtime Broker.exe schtasks.exe PID 2872 wrote to memory of 2644 2872 Runtime Broker.exe schtasks.exe PID 2872 wrote to memory of 2644 2872 Runtime Broker.exe schtasks.exe PID 2872 wrote to memory of 1700 2872 Runtime Broker.exe Runtime Broker.exe PID 2872 wrote to memory of 1700 2872 Runtime Broker.exe Runtime Broker.exe PID 2872 wrote to memory of 1700 2872 Runtime Broker.exe Runtime Broker.exe PID 1700 wrote to memory of 2700 1700 Runtime Broker.exe schtasks.exe PID 1700 wrote to memory of 2700 1700 Runtime Broker.exe schtasks.exe PID 1700 wrote to memory of 2700 1700 Runtime Broker.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe"C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe"C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exeFilesize
439KB
MD54aa8dcada269e610add8a77aa7652039
SHA1e3b1bfbbf88e5fd3dcfd2999469e8d861d1c7667
SHA256e32e182cbca18e6608ad4c1d4837f53c7a24e02ade6c69dc2cff3b16dc383a21
SHA512e859bff8beb5fc1508b4b5bd60fbf8372eb601882b2d1de5b06eeaa89219d2a517297b5de4f743ed79b94a9076805585f37637be833dfc5c4a1cc0349a7bc4fc
-
C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exeFilesize
3.1MB
MD50296021acfb4f37e63df4de7461ebfd9
SHA114117dba6ce87cbb6561ebdfffec60cb21860800
SHA2564fc6d003d67f0a1b3a276018516c6a0fe6301b10efe9e41fccd2e5a645a3333a
SHA512ffff32821dc347531f6e814df23b1f848df002c33ca83c635bc2fb1d3b810e9c21ffa6da6f0beb1a207f55a9d4048828545d678a8137991d1de2266bcbe1deee
-
memory/1700-22-0x0000000000EA0000-0x00000000011C4000-memory.dmpFilesize
3.1MB
-
memory/2872-15-0x00000000008A0000-0x0000000000BC4000-memory.dmpFilesize
3.1MB
-
memory/2880-0-0x000007FEF5683000-0x000007FEF5684000-memory.dmpFilesize
4KB
-
memory/2880-1-0x0000000000FD0000-0x000000000112E000-memory.dmpFilesize
1.4MB
-
memory/2880-6-0x000007FEF5680000-0x000007FEF606C000-memory.dmpFilesize
9.9MB
-
memory/2880-14-0x000007FEF5680000-0x000007FEF606C000-memory.dmpFilesize
9.9MB
-
memory/3060-13-0x00000000013B0000-0x0000000001424000-memory.dmpFilesize
464KB
-
memory/3060-16-0x0000000000520000-0x0000000000546000-memory.dmpFilesize
152KB