Analysis
-
max time kernel
125s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 15:19
Behavioral task
behavioral1
Sample
Uni.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Uni.exe
Resource
win10v2004-20240226-en
General
-
Target
Uni.exe
-
Size
409KB
-
MD5
28a90307277122011920de004e149e2c
-
SHA1
0c3bc0d9338ce9129833d7bb8b3b6ebf41ef4a39
-
SHA256
5b584418db5a9302834272560b076a26ae5c882e253dd23d9c603bcdf4e235e7
-
SHA512
6c24cb5886c67a2c58219bfccb0816c136ba2d4d44792c40ca8482499974e2a9abd285af63a08d983aaaef2f7ab988a150a17bbecc903a109a8effee21092276
-
SSDEEP
6144:jMvlpdRJjGq/ld9zivfK2p7/PvmfD8MbLw5C7NP4TP6ENT/4e:MpbJjGuL9zivThPvm82wwyPhNTge
Malware Config
Extracted
quasar
3.1.5
Loader Client
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
yeO4jNnQKA8amVjOSkeX
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1952-1-0x0000000000360000-0x00000000003CC000-memory.dmp family_quasar behavioral1/files/0x003800000001566b-5.dat family_quasar behavioral1/memory/2660-11-0x00000000011F0000-0x000000000125C000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2660 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 1952 Uni.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 SCHTASKS.exe 2672 schtasks.exe 2488 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1952 Uni.exe Token: SeDebugPrivilege 2660 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2660 Client.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2672 1952 Uni.exe 29 PID 1952 wrote to memory of 2672 1952 Uni.exe 29 PID 1952 wrote to memory of 2672 1952 Uni.exe 29 PID 1952 wrote to memory of 2672 1952 Uni.exe 29 PID 1952 wrote to memory of 2660 1952 Uni.exe 31 PID 1952 wrote to memory of 2660 1952 Uni.exe 31 PID 1952 wrote to memory of 2660 1952 Uni.exe 31 PID 1952 wrote to memory of 2660 1952 Uni.exe 31 PID 1952 wrote to memory of 2660 1952 Uni.exe 31 PID 1952 wrote to memory of 2660 1952 Uni.exe 31 PID 1952 wrote to memory of 2660 1952 Uni.exe 31 PID 2660 wrote to memory of 2488 2660 Client.exe 32 PID 2660 wrote to memory of 2488 2660 Client.exe 32 PID 2660 wrote to memory of 2488 2660 Client.exe 32 PID 2660 wrote to memory of 2488 2660 Client.exe 32 PID 1952 wrote to memory of 2480 1952 Uni.exe 34 PID 1952 wrote to memory of 2480 1952 Uni.exe 34 PID 1952 wrote to memory of 2480 1952 Uni.exe 34 PID 1952 wrote to memory of 2480 1952 Uni.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Uni.exe"C:\Users\Admin\AppData\Local\Temp\Uni.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Uni.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "SeroXen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2488
-
-
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Uni.exe'" /sc onlogon /rl HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD528a90307277122011920de004e149e2c
SHA10c3bc0d9338ce9129833d7bb8b3b6ebf41ef4a39
SHA2565b584418db5a9302834272560b076a26ae5c882e253dd23d9c603bcdf4e235e7
SHA5126c24cb5886c67a2c58219bfccb0816c136ba2d4d44792c40ca8482499974e2a9abd285af63a08d983aaaef2f7ab988a150a17bbecc903a109a8effee21092276