Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 13:41
Static task
static1
General
-
Target
SolaraBootstrapper.exe
-
Size
4.7MB
-
MD5
8e188560eca9ec36adb33425dd5ded3a
-
SHA1
8ff3c27b9d50e0eda7a7df3a94ecd701f4632c4d
-
SHA256
f7f233269f149d89c2178a456e9d858c366d41b525a7655a5c6633bc27914e1f
-
SHA512
da2d41f5a960b82dd5281932eedbd2df941df1a5a7a5dbbb7a0621bb483a3366932b5b9d4b7d64ce21eb8e8a492338a48ca9ee57781d38c3427e5a31f5a68ee2
-
SSDEEP
49152:fdKiv3rs1xLqz9kD7XH3iXQ7JY89kWfKn1KO+zW5GbClxAT8b7ZwQI7y:fUfx+zCniXQ71kWfKn1RBNfg7y
Malware Config
Extracted
quasar
1.4.1
Office04
ships-resistance.gl.at.ply.gg:53758
90dce01d-0491-44c9-ba30-2abd7f7ec13a
-
encryption_key
FBC87452408857575CDBB63E221DC85973427C45
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1752-0-0x0000000000400000-0x00000000008B6000-memory.dmp family_quasar behavioral1/files/0x0006000000022f74-5.dat family_quasar behavioral1/memory/1360-62-0x0000000000B90000-0x0000000000EB4000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation SolaraBootstrapper.exe -
Executes dropped EXE 2 IoCs
pid Process 1360 Loader.exe 4408 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\SubDir\svchost.exe Loader.exe File opened for modification C:\Program Files\SubDir Loader.exe File opened for modification C:\Program Files\SubDir\svchost.exe svchost.exe File opened for modification C:\Program Files\SubDir svchost.exe File created C:\Program Files\SubDir\svchost.exe Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ SolaraBootstrapper.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2216 schtasks.exe 1796 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1360 Loader.exe Token: SeDebugPrivilege 4408 svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4408 svchost.exe 4408 svchost.exe 4408 svchost.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4408 svchost.exe 4408 svchost.exe 4408 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4408 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1360 1752 SolaraBootstrapper.exe 85 PID 1752 wrote to memory of 1360 1752 SolaraBootstrapper.exe 85 PID 1360 wrote to memory of 2216 1360 Loader.exe 86 PID 1360 wrote to memory of 2216 1360 Loader.exe 86 PID 1360 wrote to memory of 4408 1360 Loader.exe 88 PID 1360 wrote to memory of 4408 1360 Loader.exe 88 PID 4408 wrote to memory of 1796 4408 svchost.exe 89 PID 4408 wrote to memory of 1796 4408 svchost.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Program Files\SubDir\svchost.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2216
-
-
C:\Program Files\SubDir\svchost.exe"C:\Program Files\SubDir\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Program Files\SubDir\svchost.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD573fe56dddb4bb1f64fef8002b04895da
SHA1c023a3e0e6081b3ca73ed9eaaf86b1ef18c160a2
SHA256399f54cf43d537dd74f697f788006def2ea1ed5c682729b5716d1e277bf610a6
SHA512a9b3fbfbd8ede25f83c5944dbfc318c529a1c480e940b1828faee0e708a6cbd5aacc8b1fbf974c8baede6aa196686b98020295c22e0a4d840670d008b671dc06