Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 19:01

General

  • Target

    Remcosv4.9.3LightMOD.exe

  • Size

    40.3MB

  • MD5

    d3de21913cdebc1c84d668de22831d85

  • SHA1

    2619ebb87016473c06ed820a8d26120b704b8023

  • SHA256

    4ff6da365ddd8c3f3e4c186022ab9447b2f6123adf991a81cd58bc71ecb2522a

  • SHA512

    bccee54ff31b9321020276c311f609951c47dac790ddfc47bcca0d19052fcd5d27340cb99d87f4c762e11c99f39a2b7cbe379d2fabdc8da91c637adccd8339cf

  • SSDEEP

    786432:MukwgGc0LdSPyiMJj2uK0P7ts6CcEwVOgjxBdgoz8pF4zqIdvXO/:Xc0QaiYj2AP7y62wV5jxBXVPG

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Remcos

C2

team-circles.gl.at.ply.gg:25349

Mutex

109bae44-c7e4-46f2-82cd-2c3efb4dc47e

Attributes
  • encryption_key

    78AF43F549EE55D0FC30D38EC96EAA6F3A3F5CDF

  • install_name

    Runtime Broker.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Runtime Broker

  • subdirectory

    WD Defender

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Remcosv4.9.3LightMOD.exe
    "C:\Users\Admin\AppData\Local\Temp\Remcosv4.9.3LightMOD.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\Remcos v4.9.3 Light MOD.exe
      "C:\Users\Admin\AppData\Local\Temp\Remcos v4.9.3 Light MOD.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3048
    • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
      "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2676
      • C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe
        "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\system32\schtasks.exe
          "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WD Defender\Runtime Broker.exe" /rl HIGHEST /f
          4⤵
          • Creates scheduled task(s)
          PID:1436

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Remcos v4.9.3 Light MOD.exe
    Filesize

    39.2MB

    MD5

    6eacce4a82cf898472ad2aa8b0267cca

    SHA1

    954def54ec22b1ade594e7f501384fe19d2bbfef

    SHA256

    522a915d9a78b68fee628014e4559e82bcbf137d9abc521e57b6e7aca695cec7

    SHA512

    3004e9f64ba6258b3780d534bd59b3c8ae611e29d846e0aaa197af892f56708379b4996295de5c777ef845a031c44915bf3faa17b137f892a81373423bd47ad1

  • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
    Filesize

    3.1MB

    MD5

    0296021acfb4f37e63df4de7461ebfd9

    SHA1

    14117dba6ce87cbb6561ebdfffec60cb21860800

    SHA256

    4fc6d003d67f0a1b3a276018516c6a0fe6301b10efe9e41fccd2e5a645a3333a

    SHA512

    ffff32821dc347531f6e814df23b1f848df002c33ca83c635bc2fb1d3b810e9c21ffa6da6f0beb1a207f55a9d4048828545d678a8137991d1de2266bcbe1deee

  • memory/820-14-0x0000000000FC0000-0x00000000012E4000-memory.dmp
    Filesize

    3.1MB

  • memory/2392-0-0x000007FEF5533000-0x000007FEF5534000-memory.dmp
    Filesize

    4KB

  • memory/2392-1-0x0000000000940000-0x0000000003194000-memory.dmp
    Filesize

    40.3MB

  • memory/2392-2-0x000007FEF5530000-0x000007FEF5F1C000-memory.dmp
    Filesize

    9.9MB

  • memory/2392-15-0x000007FEF5530000-0x000007FEF5F1C000-memory.dmp
    Filesize

    9.9MB

  • memory/2612-21-0x0000000000DE0000-0x0000000001104000-memory.dmp
    Filesize

    3.1MB

  • memory/3048-49-0x00000000066A0000-0x00000000066A1000-memory.dmp
    Filesize

    4KB

  • memory/3048-37-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3048-56-0x0000000007DE0000-0x0000000007DE1000-memory.dmp
    Filesize

    4KB

  • memory/3048-63-0x0000000000400000-0x000000000668E000-memory.dmp
    Filesize

    98.6MB

  • memory/3048-54-0x0000000007DE0000-0x0000000007DE1000-memory.dmp
    Filesize

    4KB

  • memory/3048-51-0x00000000066A0000-0x00000000066A1000-memory.dmp
    Filesize

    4KB

  • memory/3048-61-0x0000000007DF0000-0x0000000007DF1000-memory.dmp
    Filesize

    4KB

  • memory/3048-46-0x0000000006690000-0x0000000006691000-memory.dmp
    Filesize

    4KB

  • memory/3048-44-0x0000000006690000-0x0000000006691000-memory.dmp
    Filesize

    4KB

  • memory/3048-41-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3048-39-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/3048-59-0x0000000007DF0000-0x0000000007DF1000-memory.dmp
    Filesize

    4KB

  • memory/3048-36-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/3048-34-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/3048-32-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/3048-31-0x0000000000260000-0x0000000000261000-memory.dmp
    Filesize

    4KB

  • memory/3048-29-0x0000000000260000-0x0000000000261000-memory.dmp
    Filesize

    4KB

  • memory/3048-27-0x0000000000260000-0x0000000000261000-memory.dmp
    Filesize

    4KB

  • memory/3048-26-0x00000000001C0000-0x00000000001C1000-memory.dmp
    Filesize

    4KB

  • memory/3048-24-0x00000000001C0000-0x00000000001C1000-memory.dmp
    Filesize

    4KB

  • memory/3048-22-0x00000000001C0000-0x00000000001C1000-memory.dmp
    Filesize

    4KB