Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 23:55
General
-
Target
gaypornmail.exe
-
Size
3.1MB
-
MD5
9cbc1d8a99e87feeb6077f26cb061429
-
SHA1
f0e3d7d0b2e5defc4aa4f24cd07396b3ddf88431
-
SHA256
4bca1aade0f88c32cb4e953c2cad495dae2e8f82d7096deea0b8f4370ff89ef8
-
SHA512
10408dd2375d529f92c72ea05a1cb736b85604f755f74cde4a7e7eba1ac35a42e4d29eed092161cc620aa2d592aee65d2926839bfc3f6ed6d397509749525a87
-
SSDEEP
49152:uv8t62XlaSFNWPjljiFa2RoUYIkCg1JNLoGd+THHB72eh2NT:uvA62XlaSFNWPjljiFXRoUYIkCG
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
history-foo.gl.at.ply.gg:42349
Mutex
2beddbf7-c691-4058-94c7-f54389b4a581
Attributes
-
encryption_key
CBFC5D217E55BEBDCD3A6EFA924299F76BC328D9
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1536-1-0x0000000000170000-0x0000000000494000-memory.dmp family_quasar -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe 1536 gaypornmail.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1536 gaypornmail.exe Token: SeBackupPrivilege 2216 svchost.exe Token: SeRestorePrivilege 2216 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1536 gaypornmail.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gaypornmail.exe"C:\Users\Admin\AppData\Local\Temp\gaypornmail.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:4444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2216