Malware Analysis Report

2024-08-06 11:21

Sample ID 240615-xjvc5svfqq
Target LyphaBuilder.exe
SHA256 7915d96fd92766003b73b58c3e9b375487479b9b582ed3be8a88bf5fed8a8208
Tags
quasar remcos spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7915d96fd92766003b73b58c3e9b375487479b9b582ed3be8a88bf5fed8a8208

Threat Level: Known bad

The file LyphaBuilder.exe was found to be: Known bad.

Malicious Activity Summary

quasar remcos spyware trojan

Quasar RAT

Quasar payload

Executes dropped EXE

Checks computer location settings

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Uses Task Scheduler COM API

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-15 18:53

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-15 18:53

Reported

2024-06-15 18:56

Platform

win7-20240221-en

Max time kernel

127s

Max time network

137s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2880 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe
PID 2880 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe
PID 2880 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe
PID 2880 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
PID 2880 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
PID 2880 wrote to memory of 2872 N/A C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
PID 2872 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe C:\Windows\system32\schtasks.exe
PID 2872 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe C:\Windows\system32\schtasks.exe
PID 2872 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe C:\Windows\system32\schtasks.exe
PID 2872 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe
PID 2872 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe
PID 2872 wrote to memory of 1700 N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe
PID 1700 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe C:\Windows\system32\schtasks.exe
PID 1700 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe C:\Windows\system32\schtasks.exe
PID 1700 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe C:\Windows\system32\schtasks.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe

"C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe"

C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe

"C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe"

C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"

C:\Windows\system32\schtasks.exe

"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe" /rl HIGHEST /f

C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe

"C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe"

C:\Windows\system32\schtasks.exe

"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe" /rl HIGHEST /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 team-circles.gl.at.ply.gg udp
US 147.185.221.20:25349 team-circles.gl.at.ply.gg tcp
US 147.185.221.20:25349 team-circles.gl.at.ply.gg tcp
US 147.185.221.20:25349 team-circles.gl.at.ply.gg tcp
US 147.185.221.20:25349 team-circles.gl.at.ply.gg tcp
US 147.185.221.20:25349 team-circles.gl.at.ply.gg tcp
US 147.185.221.20:25349 team-circles.gl.at.ply.gg tcp

Files

memory/2880-0-0x000007FEF5683000-0x000007FEF5684000-memory.dmp

memory/2880-1-0x0000000000FD0000-0x000000000112E000-memory.dmp

memory/2880-6-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe

MD5 4aa8dcada269e610add8a77aa7652039
SHA1 e3b1bfbbf88e5fd3dcfd2999469e8d861d1c7667
SHA256 e32e182cbca18e6608ad4c1d4837f53c7a24e02ade6c69dc2cff3b16dc383a21
SHA512 e859bff8beb5fc1508b4b5bd60fbf8372eb601882b2d1de5b06eeaa89219d2a517297b5de4f743ed79b94a9076805585f37637be833dfc5c4a1cc0349a7bc4fc

C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

MD5 0296021acfb4f37e63df4de7461ebfd9
SHA1 14117dba6ce87cbb6561ebdfffec60cb21860800
SHA256 4fc6d003d67f0a1b3a276018516c6a0fe6301b10efe9e41fccd2e5a645a3333a
SHA512 ffff32821dc347531f6e814df23b1f848df002c33ca83c635bc2fb1d3b810e9c21ffa6da6f0beb1a207f55a9d4048828545d678a8137991d1de2266bcbe1deee

memory/3060-13-0x00000000013B0000-0x0000000001424000-memory.dmp

memory/2880-14-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

memory/2872-15-0x00000000008A0000-0x0000000000BC4000-memory.dmp

memory/3060-16-0x0000000000520000-0x0000000000546000-memory.dmp

memory/1700-22-0x0000000000EA0000-0x00000000011C4000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-15 18:53

Reported

2024-06-15 18:56

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe

"C:\Users\Admin\AppData\Local\Temp\LyphaBuilder.exe"

C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe

"C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe"

C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

"C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"

C:\Windows\SYSTEM32\schtasks.exe

"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe" /rl HIGHEST /f

Network

Files

memory/3672-1-0x00007FFE5AE83000-0x00007FFE5AE85000-memory.dmp

memory/3672-0-0x0000000000BD0000-0x0000000000D2E000-memory.dmp

memory/3672-3-0x00007FFE5AE80000-0x00007FFE5B941000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Lypha-Builder.exe

MD5 4aa8dcada269e610add8a77aa7652039
SHA1 e3b1bfbbf88e5fd3dcfd2999469e8d861d1c7667
SHA256 e32e182cbca18e6608ad4c1d4837f53c7a24e02ade6c69dc2cff3b16dc383a21
SHA512 e859bff8beb5fc1508b4b5bd60fbf8372eb601882b2d1de5b06eeaa89219d2a517297b5de4f743ed79b94a9076805585f37637be833dfc5c4a1cc0349a7bc4fc

C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

MD5 0296021acfb4f37e63df4de7461ebfd9
SHA1 14117dba6ce87cbb6561ebdfffec60cb21860800
SHA256 4fc6d003d67f0a1b3a276018516c6a0fe6301b10efe9e41fccd2e5a645a3333a
SHA512 ffff32821dc347531f6e814df23b1f848df002c33ca83c635bc2fb1d3b810e9c21ffa6da6f0beb1a207f55a9d4048828545d678a8137991d1de2266bcbe1deee

memory/4276-29-0x00000000025D0000-0x00000000025F6000-memory.dmp

memory/1524-28-0x0000000000C60000-0x0000000000F84000-memory.dmp

memory/3672-30-0x00007FFE5AE80000-0x00007FFE5B941000-memory.dmp

memory/4276-27-0x00000000004A0000-0x0000000000514000-memory.dmp

memory/1524-31-0x00007FFE5AE80000-0x00007FFE5B941000-memory.dmp

memory/4276-22-0x00007FFE5AE80000-0x00007FFE5B941000-memory.dmp

memory/4276-32-0x00007FFE5AE80000-0x00007FFE5B941000-memory.dmp

memory/4276-34-0x00007FFE5AE80000-0x00007FFE5B941000-memory.dmp

memory/1524-35-0x00007FFE5AE80000-0x00007FFE5B941000-memory.dmp