Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 01:04

General

  • Target

    RDP Brute_Cracked.exe

  • Size

    1.7MB

  • MD5

    bd5cd7f77a38e709cb03b8b60cfcc15c

  • SHA1

    ed59b52ea4c63ffd6322bcb43155f2245048a541

  • SHA256

    4f66d0ced260b21359d60081d26c57bdeb3b54a293d084201589019d79379e8e

  • SHA512

    0f5973d3b16362cc2540065188bd3650be6622a8bf3b1bb6e310ec3f395292b916c0b1dd3514497a78efee847da16bf559eb21b3225d80ffb4ded4819a8a4b63

  • SSDEEP

    24576:Cj5yx6uJa4WiXV15W/F4A8A3GpF8EfE1FF1ehGXeRxm8F0EJSoUkgBbt:e59+WaV1J6GpFDEV1eEox10EPEbt

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

kgf6

C2

23.105.131.187:7812

Mutex

VNM_MUTEX_Yv6S9FB2pcVgrrmUN6

Attributes
  • encryption_key

    4Kz1OwOQ5f9Qc8aAEQ9S

  • install_name

    Windows Security Health Service.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    SubDir

Extracted

Family

quasar

Version

2.1.0.0

Botnet

kgf5

C2

23.105.131.187:7812

Mutex

VNM_MUTEX_NOLy9wmTFSi1F4L2HO

Attributes
  • encryption_key

    8jlBZS9It7EamPWEVqxP

  • install_name

    Windows Defender Security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Security

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RDP Brute_Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\RDP Brute_Cracked.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
      "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
        "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Checks computer location settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3504
        • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3344
          • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe" /rl HIGHEST /f
              6⤵
              • Scheduled Task/Job: Scheduled Task
              PID:4524
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:8
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          4⤵
            PID:3728
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
              5⤵
                PID:1864
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uLqPyvR7lkgl.bat" "
              4⤵
                PID:4484
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  5⤵
                    PID:4560
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 10 localhost
                    5⤵
                    • Runs ping.exe
                    PID:4700
                  • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
                    "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2168
                    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
                      "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:4220
                    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
                      "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:4436
                    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
                      "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4044
            • C:\Users\Admin\AppData\Roaming\Windows Update.exe
              "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
              2⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:5020
              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
                3⤵
                • Modifies Windows Defender Real-time Protection settings
                • Checks computer location settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3132
                • C:\Windows\SysWOW64\schtasks.exe
                  "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Update.exe" /rl HIGHEST /f
                  4⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:1280
                • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4580
                  • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe
                    "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1200
                    • C:\Windows\SysWOW64\schtasks.exe
                      "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe" /rl HIGHEST /f
                      6⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:1892
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" Get-MpPreference -verbose
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:208
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
                  4⤵
                    PID:4116
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
                      5⤵
                        PID:3684
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s8IjwR4OiJT6.bat" "
                      4⤵
                        PID:4380
                  • C:\Users\Admin\AppData\Roaming\RDP Brute_Cracked.exe
                    "C:\Users\Admin\AppData\Roaming\RDP Brute_Cracked.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:4456

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Windows Defender Security.exe.log

                  Filesize

                  706B

                  MD5

                  f8bcaf312de8591707436c1dcebba8e4

                  SHA1

                  a1269828e5f644601622f4a7a611aec8f2eda0b2

                  SHA256

                  f0f5a90777c70cdceea22bd66b33c1703a318acc45cb012d0b01585a1ac12b29

                  SHA512

                  3a714f5950584abbc94a27bbd4623bfc5acb1135c8c9fca4d74e70c8481b71ace7dbc1dfbf101dd07c76a050acfb4852f31dd57fc7ae196382336c5edc9e6413

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Windows Update.exe.log

                  Filesize

                  507B

                  MD5

                  76ffb2f33cb32ade8fc862a67599e9d8

                  SHA1

                  920cc4ab75b36d2f9f6e979b74db568973c49130

                  SHA256

                  f1a3724670e3379318ec9c73f6f39058cab0ab013ba3cd90c047c3d701362310

                  SHA512

                  f33502c2e1bb30c05359bfc6819ca934642a1e01874e3060349127d792694d56ad22fccd6c9477b8ee50d66db35785779324273f509576b48b7f85577e001b4e

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  3d086a433708053f9bf9523e1d87a4e8

                  SHA1

                  b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                  SHA256

                  6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                  SHA512

                  931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  760ef2ed50f0f42213deb0c9b84eddd1

                  SHA1

                  98b547abb71eeb37036d6f4c002efbf1bdfba995

                  SHA256

                  353db300891fe9708fccfedc5bd7c0ebd7a2e028b2d8e791c5b161726b32ea33

                  SHA512

                  160a23ca6aacdae9bd0855308067c09ed6f7896dc9577b719a8a0fbb15b07d581ff754358499fd5ada07f2943f166f84ba9d29a6057554d0e1eb50cbc9b2d519

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2r4aekcr.kuf.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\s8IjwR4OiJT6.bat

                  Filesize

                  208B

                  MD5

                  cdc11e0c869bb2dabe34481e71d820f5

                  SHA1

                  949ab161254011adce9d9bca02aab44eacc07f65

                  SHA256

                  678950c7bdbbbe1949419b5a23d79c8910246d7065a99da16761e6fe32ba41b6

                  SHA512

                  4cdc17e413799d2d28e8611c9dc1b42f18b67e378d60177f2ab8d997901d1b89bceaf89ccfe8227400402a68d69c1a1f56d77b85df5c8589b0efaf99061c963a

                • C:\Users\Admin\AppData\Local\Temp\uLqPyvR7lkgl.bat

                  Filesize

                  219B

                  MD5

                  01a67249866d08ad4c0c3b70319c43dd

                  SHA1

                  7ba139db4947fc10162f4111bcc3be9200cd9f85

                  SHA256

                  ce8bd3693b8af002ecb78319ed821a1174f00bf69eef453e0951107522e9f2c5

                  SHA512

                  fd5e1ccd0792f8623160fdc0d15b0606f8add5f62a57988475de878c8e5611bac77972590356ba7c7ee2792cda765a24f90335a48d7cb27624899dc3670d65ed

                • C:\Users\Admin\AppData\Roaming\Logs\07-12-2024

                  Filesize

                  224B

                  MD5

                  55871997210e9743c993f3335b7f065d

                  SHA1

                  027e06fa871080f33aaf031a55ef67ebaf764cff

                  SHA256

                  beb5f4fdd857fdb62e3cd6cb21dd604b79e6c81ec3076a10ce873a2207e5dc84

                  SHA512

                  3d6a766371e87e92b8a9ea72eb1c6dac0c8272ed7f14be626f8a5d4ae3a390cd2380bdf4ef16e95e5627ab9b9adc20341068b569b8dc1290c03a2d2cfb484985

                • C:\Users\Admin\AppData\Roaming\RDP Brute_Cracked.exe

                  Filesize

                  680KB

                  MD5

                  11fd02d3ea805ec220aa7365977a91fd

                  SHA1

                  515f8b62940c7a3121647f8fb21a735b570a7ae2

                  SHA256

                  c9bdc04ed6f4c4641d445a8de2df40fdc4caeb475b747f129d870948df53ff25

                  SHA512

                  25b31d38259545625bc85926ab148a3d3c1c5d494f68c5c916d2a2d37ba066e1c65119325eece62e2dd715f6a8b79dc148f228929680a812413d25a9100eec8b

                • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe

                  Filesize

                  659KB

                  MD5

                  64d8e9454e6aee8ab06ff04de44b5a78

                  SHA1

                  ec3882f5fcd42fb5cba64f36c8e8aad053ce0809

                  SHA256

                  88328daff21d049a4b50d0a997e747efe559faa8a6345f6637730ad5679311e1

                  SHA512

                  ece5de5ecf5ad8b4db363a8701206ac47b76e313368ce3bf30a5b22634ac3ff621d348be5441ed85c2adf61a405b6917dde2cb793e3095a9c71d26378d8dc7d8

                • C:\Users\Admin\AppData\Roaming\Windows Update.exe

                  Filesize

                  560KB

                  MD5

                  a1840a96c2aac71cc19d6d16e79ed089

                  SHA1

                  a5e6648c4424385954a9bf0d5680006c7ff959fc

                  SHA256

                  4b522519d68c7a32d1586526f74a5cc5b84827a0c606d2ea21b064d893016e86

                  SHA512

                  e3c779077adea0081d38da4c6601e3d130c514cbb7bf21be353a7fbf0d1e6fb321b8278e08386f90b7d7ee19f6a340e0b273e75fe5f9edea985920cb421dc229

                • memory/8-131-0x0000000007480000-0x0000000007AFA000-memory.dmp

                  Filesize

                  6.5MB

                • memory/8-121-0x0000000070620000-0x000000007066C000-memory.dmp

                  Filesize

                  304KB

                • memory/8-139-0x0000000007100000-0x0000000007108000-memory.dmp

                  Filesize

                  32KB

                • memory/8-138-0x0000000007120000-0x000000000713A000-memory.dmp

                  Filesize

                  104KB

                • memory/8-102-0x0000000005AB0000-0x0000000005ACE000-memory.dmp

                  Filesize

                  120KB

                • memory/8-91-0x0000000005500000-0x0000000005566000-memory.dmp

                  Filesize

                  408KB

                • memory/8-135-0x0000000006FE0000-0x0000000006FF1000-memory.dmp

                  Filesize

                  68KB

                • memory/8-134-0x0000000007060000-0x00000000070F6000-memory.dmp

                  Filesize

                  600KB

                • memory/8-86-0x0000000004D20000-0x0000000004D42000-memory.dmp

                  Filesize

                  136KB

                • memory/8-80-0x0000000004DD0000-0x00000000053F8000-memory.dmp

                  Filesize

                  6.2MB

                • memory/208-108-0x0000000005FD0000-0x0000000006002000-memory.dmp

                  Filesize

                  200KB

                • memory/208-119-0x0000000006010000-0x000000000602E000-memory.dmp

                  Filesize

                  120KB

                • memory/208-109-0x0000000070620000-0x000000007066C000-memory.dmp

                  Filesize

                  304KB

                • memory/208-79-0x0000000000CA0000-0x0000000000CD6000-memory.dmp

                  Filesize

                  216KB

                • memory/208-132-0x0000000006D30000-0x0000000006D4A000-memory.dmp

                  Filesize

                  104KB

                • memory/208-133-0x0000000006DA0000-0x0000000006DAA000-memory.dmp

                  Filesize

                  40KB

                • memory/208-136-0x0000000006F60000-0x0000000006F6E000-memory.dmp

                  Filesize

                  56KB

                • memory/208-120-0x0000000006C00000-0x0000000006CA3000-memory.dmp

                  Filesize

                  652KB

                • memory/208-101-0x0000000005640000-0x0000000005994000-memory.dmp

                  Filesize

                  3.3MB

                • memory/208-137-0x0000000006F70000-0x0000000006F84000-memory.dmp

                  Filesize

                  80KB

                • memory/208-103-0x0000000005A40000-0x0000000005A8C000-memory.dmp

                  Filesize

                  304KB

                • memory/1200-105-0x0000000006F00000-0x0000000006F0A000-memory.dmp

                  Filesize

                  40KB

                • memory/2144-1-0x0000000075370000-0x0000000075921000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2144-2-0x0000000075370000-0x0000000075921000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2144-0-0x0000000075372000-0x0000000075373000-memory.dmp

                  Filesize

                  4KB

                • memory/2144-45-0x0000000075370000-0x0000000075921000-memory.dmp

                  Filesize

                  5.7MB

                • memory/2320-62-0x0000000005FF0000-0x0000000006002000-memory.dmp

                  Filesize

                  72KB

                • memory/2320-57-0x0000000000400000-0x000000000048C000-memory.dmp

                  Filesize

                  560KB

                • memory/3132-53-0x0000000000400000-0x000000000048C000-memory.dmp

                  Filesize

                  560KB

                • memory/3132-63-0x0000000006CC0000-0x0000000006CFC000-memory.dmp

                  Filesize

                  240KB

                • memory/3132-61-0x00000000058B0000-0x0000000005916000-memory.dmp

                  Filesize

                  408KB

                • memory/3980-31-0x00000000724EE000-0x00000000724EF000-memory.dmp

                  Filesize

                  4KB

                • memory/3980-42-0x0000000000850000-0x00000000008FC000-memory.dmp

                  Filesize

                  688KB

                • memory/4456-46-0x00007FF8D94A3000-0x00007FF8D94A5000-memory.dmp

                  Filesize

                  8KB

                • memory/4456-43-0x000001AFC45F0000-0x000001AFC469C000-memory.dmp

                  Filesize

                  688KB

                • memory/5020-52-0x0000000005700000-0x000000000570A000-memory.dmp

                  Filesize

                  40KB

                • memory/5020-44-0x00000000724E0000-0x0000000072C90000-memory.dmp

                  Filesize

                  7.7MB

                • memory/5020-50-0x00000000058E0000-0x000000000597C000-memory.dmp

                  Filesize

                  624KB

                • memory/5020-56-0x00000000724E0000-0x0000000072C90000-memory.dmp

                  Filesize

                  7.7MB

                • memory/5020-47-0x0000000000E20000-0x0000000000EB2000-memory.dmp

                  Filesize

                  584KB

                • memory/5020-48-0x0000000005E90000-0x0000000006434000-memory.dmp

                  Filesize

                  5.6MB

                • memory/5020-49-0x00000000057A0000-0x0000000005832000-memory.dmp

                  Filesize

                  584KB