Analysis
-
max time kernel
295s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 04:22
Behavioral task
behavioral1
Sample
svchost1.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
svchost1.exe
Resource
win10v2004-20240508-en
General
-
Target
svchost1.exe
-
Size
409KB
-
MD5
b80b8c569a390b124cb7aaae003c8a82
-
SHA1
c38fc46e835ccbb538f4df122e501d07562553c4
-
SHA256
49686a0b50103315e6a2a8af78084b9b5eb485ad4767f2d63043d8969ff9bb23
-
SHA512
75148f5e619eea0b6f44b3e6ecc0d4e6a97775fee2456209d90c002f8baacfa9109b2be90da6afdf0282c7704a9542bb01c6566d383d4a0b587508e4f6fdfb47
-
SSDEEP
12288:epsD64e1M8c4Q7JkMgtqB+chi4gjEhNjh:6sG4kMfJiqBNfPh
Malware Config
Extracted
quasar
3.1.5
SeroXen | v3.1.5 |
nexosmith1231-54169.portmap.host:4782
$Sxr-NbHXQzYHWTCnT97XUN
-
encryption_key
v2wYEk6QCkLkJJ1DyEGm
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-1-0x0000000000120000-0x000000000018C000-memory.dmp family_quasar \Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe family_quasar behavioral1/memory/3008-11-0x00000000010F0000-0x000000000115C000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
Processes:
$sxr-powershell.exepid process 3008 $sxr-powershell.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost1.exepid process 2040 svchost1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeSCHTASKS.exepid process 2168 schtasks.exe 2132 schtasks.exe 2392 SCHTASKS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost1.exe$sxr-powershell.exedescription pid process Token: SeDebugPrivilege 2040 svchost1.exe Token: SeDebugPrivilege 3008 $sxr-powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
$sxr-powershell.exepid process 3008 $sxr-powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
svchost1.exe$sxr-powershell.exedescription pid process target process PID 2040 wrote to memory of 2168 2040 svchost1.exe schtasks.exe PID 2040 wrote to memory of 2168 2040 svchost1.exe schtasks.exe PID 2040 wrote to memory of 2168 2040 svchost1.exe schtasks.exe PID 2040 wrote to memory of 2168 2040 svchost1.exe schtasks.exe PID 2040 wrote to memory of 3008 2040 svchost1.exe $sxr-powershell.exe PID 2040 wrote to memory of 3008 2040 svchost1.exe $sxr-powershell.exe PID 2040 wrote to memory of 3008 2040 svchost1.exe $sxr-powershell.exe PID 2040 wrote to memory of 3008 2040 svchost1.exe $sxr-powershell.exe PID 3008 wrote to memory of 2132 3008 $sxr-powershell.exe schtasks.exe PID 3008 wrote to memory of 2132 3008 $sxr-powershell.exe schtasks.exe PID 3008 wrote to memory of 2132 3008 $sxr-powershell.exe schtasks.exe PID 3008 wrote to memory of 2132 3008 $sxr-powershell.exe schtasks.exe PID 2040 wrote to memory of 2392 2040 svchost1.exe SCHTASKS.exe PID 2040 wrote to memory of 2392 2040 svchost1.exe SCHTASKS.exe PID 2040 wrote to memory of 2392 2040 svchost1.exe SCHTASKS.exe PID 2040 wrote to memory of 2392 2040 svchost1.exe SCHTASKS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost1.exe"C:\Users\Admin\AppData\Local\Temp\svchost1.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\svchost1.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77svchost1.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\svchost1.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\$sxr-seroxen2\$sxr-powershell.exeFilesize
409KB
MD5b80b8c569a390b124cb7aaae003c8a82
SHA1c38fc46e835ccbb538f4df122e501d07562553c4
SHA25649686a0b50103315e6a2a8af78084b9b5eb485ad4767f2d63043d8969ff9bb23
SHA51275148f5e619eea0b6f44b3e6ecc0d4e6a97775fee2456209d90c002f8baacfa9109b2be90da6afdf0282c7704a9542bb01c6566d383d4a0b587508e4f6fdfb47
-
memory/2040-0-0x000000007492E000-0x000000007492F000-memory.dmpFilesize
4KB
-
memory/2040-1-0x0000000000120000-0x000000000018C000-memory.dmpFilesize
432KB
-
memory/2040-2-0x0000000074920000-0x000000007500E000-memory.dmpFilesize
6.9MB
-
memory/2040-14-0x0000000074920000-0x000000007500E000-memory.dmpFilesize
6.9MB
-
memory/3008-10-0x0000000074920000-0x000000007500E000-memory.dmpFilesize
6.9MB
-
memory/3008-11-0x00000000010F0000-0x000000000115C000-memory.dmpFilesize
432KB
-
memory/3008-12-0x0000000074920000-0x000000007500E000-memory.dmpFilesize
6.9MB
-
memory/3008-15-0x0000000074920000-0x000000007500E000-memory.dmpFilesize
6.9MB