Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-07-2024 01:04

General

  • Target

    RDP Brute_Cracked.exe

  • Size

    1.7MB

  • MD5

    bd5cd7f77a38e709cb03b8b60cfcc15c

  • SHA1

    ed59b52ea4c63ffd6322bcb43155f2245048a541

  • SHA256

    4f66d0ced260b21359d60081d26c57bdeb3b54a293d084201589019d79379e8e

  • SHA512

    0f5973d3b16362cc2540065188bd3650be6622a8bf3b1bb6e310ec3f395292b916c0b1dd3514497a78efee847da16bf559eb21b3225d80ffb4ded4819a8a4b63

  • SSDEEP

    24576:Cj5yx6uJa4WiXV15W/F4A8A3GpF8EfE1FF1ehGXeRxm8F0EJSoUkgBbt:e59+WaV1J6GpFDEV1eEox10EPEbt

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

kgf6

C2

23.105.131.187:7812

Mutex

VNM_MUTEX_Yv6S9FB2pcVgrrmUN6

Attributes
  • encryption_key

    4Kz1OwOQ5f9Qc8aAEQ9S

  • install_name

    Windows Security Health Service.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    SubDir

Extracted

Family

quasar

Version

2.1.0.0

Botnet

kgf5

C2

23.105.131.187:7812

Mutex

VNM_MUTEX_NOLy9wmTFSi1F4L2HO

Attributes
  • encryption_key

    8jlBZS9It7EamPWEVqxP

  • install_name

    Windows Defender Security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Security

  • subdirectory

    SubDir

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Executes dropped EXE 13 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RDP Brute_Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\RDP Brute_Cracked.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
      "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
        "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5040
        • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe"
            5⤵
            • Executes dropped EXE
            PID:3156
          • C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1452
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Defender Security.exe" /rl HIGHEST /f
              6⤵
              • Scheduled Task/Job: Scheduled Task
              PID:1652
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3848
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
          4⤵
            PID:2912
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
              5⤵
                PID:2424
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OUIU0E70fV8G.bat" "
              4⤵
                PID:4948
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  5⤵
                    PID:4380
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 10 localhost
                    5⤵
                    • Runs ping.exe
                    PID:1640
                  • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
                    "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:1824
                    • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe
                      "C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4408
            • C:\Users\Admin\AppData\Roaming\Windows Update.exe
              "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
              2⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4948
              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
                3⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1076
                • C:\Windows\SysWOW64\schtasks.exe
                  "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Update.exe" /rl HIGHEST /f
                  4⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:2100
                • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe
                  "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1080
                  • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe
                    "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:2196
                  • C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe
                    "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:4020
                    • C:\Windows\SysWOW64\schtasks.exe
                      "schtasks" /create /tn "Windows Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security Health Service.exe" /rl HIGHEST /f
                      6⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:1272
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "powershell" Get-MpPreference -verbose
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3364
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit
                  4⤵
                    PID:856
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*
                      5⤵
                        PID:1412
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SEdmf2jADmeq.bat" "
                      4⤵
                        PID:5036
                  • C:\Users\Admin\AppData\Roaming\RDP Brute_Cracked.exe
                    "C:\Users\Admin\AppData\Roaming\RDP Brute_Cracked.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:3000

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Windows Defender Security.exe.log

                  Filesize

                  706B

                  MD5

                  1b078d78e73002021f4dd7d664994c4b

                  SHA1

                  55a0e705823a78167f8555a011922ce11cd52632

                  SHA256

                  d037fa9fcd062ca5c2f8bec1b1a92adede33b9d2546e12b78dd413f1f5c07b40

                  SHA512

                  7ceb0622c3a05305b203f3e4402f573ce3c46619ee1505ed09c4efa75671fd3fd9567338b156dfe7c576e3aa5252939c973b1e2b807a8423c66a79bb56ebf0eb

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Windows Update.exe.log

                  Filesize

                  507B

                  MD5

                  29b1c5a4105d370da2522f68d9c52bd1

                  SHA1

                  c952a431188c21c550ba710be0e1375df4d7a74d

                  SHA256

                  7bb26a298a5bff4d6935ef09f7bc80114835e0a7a8858d1ddffc34d31918d23b

                  SHA512

                  74934a93170b794349b91c6e05f3d2eb7edd48a5b88eebeef4368eba5f089139888a6fe6f4e5de557b3ce1d061468e6ace99d26848bdbc4c2b798f7c24782e5d

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                  Filesize

                  2KB

                  MD5

                  ac4917a885cf6050b1a483e4bc4d2ea5

                  SHA1

                  b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                  SHA256

                  e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                  SHA512

                  092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  18KB

                  MD5

                  4458604205aa1aff7b94ec432a9ea79b

                  SHA1

                  9e19870ef40cf30725bce0d80bb00b1b5794ca9c

                  SHA256

                  a8a1f01cc74df5d60645fd4fb3fe34d9889dae94aa34605f2da5f829ffd080b2

                  SHA512

                  9385323781dd196bf6a831e35b74001f2918dc220e94175151788c9ea180ef6d9daabbc343c3e5471dfab98df4aa4d47f4d9817267bf575e32cffcc058da379d

                • C:\Users\Admin\AppData\Local\Temp\OUIU0E70fV8G.bat

                  Filesize

                  219B

                  MD5

                  c1cd4df8dd54c52254572a6a2d74930b

                  SHA1

                  7e975e61667ff025220bdbc07b2d23fcbe5a8f44

                  SHA256

                  16dab7f955c690933036e65c38e6b0f0aee5e1d4adc3529b7835a9b5bb920ccf

                  SHA512

                  3bb4e2bcfe11975db51d7a3e1348bfcfeb611de5bb143ea66cbb02b0eae3224af736af474c27a9e9230288bfd9a55c5b1424ee1f132da89ea27873f804ac0aec

                • C:\Users\Admin\AppData\Local\Temp\SEdmf2jADmeq.bat

                  Filesize

                  208B

                  MD5

                  6f3407ad0aadad52f4c719ec0afdfd4c

                  SHA1

                  c1a933fb8382eb8d13ec126a0a9c361ea9cdd133

                  SHA256

                  440f6ef9de00e98d0d54427e9c2c6c8f8c1ea7c4e0df77671c44966cd1dcf10b

                  SHA512

                  62e09cb3c80618cdce518f0bec09d668467ed933a22833b505ace60c8fd6c9aa2384659eff6d1d1d8136a26c8584b20712e65fe6cc2f590acc57c977a826832f

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bzar45w1.ia4.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Roaming\Logs\07-12-2024

                  Filesize

                  224B

                  MD5

                  dcf7f40283ead6147d43be681b775f81

                  SHA1

                  ad052f2661ace84b9f9758fcb3306cde1cfc20f7

                  SHA256

                  4dc5b4ba75091c8cb7c3915153271ac0150e9c8fa4c84baee3e019400189ab76

                  SHA512

                  adc136cd8c479fd11a591f8d956d59c0df9d61390d5f1c24f1ab49fd3e63f90af53abdf40cb5015656b2ca505169c6a556682fe3df32a62374f913d3b8fbe617

                • C:\Users\Admin\AppData\Roaming\RDP Brute_Cracked.exe

                  Filesize

                  680KB

                  MD5

                  11fd02d3ea805ec220aa7365977a91fd

                  SHA1

                  515f8b62940c7a3121647f8fb21a735b570a7ae2

                  SHA256

                  c9bdc04ed6f4c4641d445a8de2df40fdc4caeb475b747f129d870948df53ff25

                  SHA512

                  25b31d38259545625bc85926ab148a3d3c1c5d494f68c5c916d2a2d37ba066e1c65119325eece62e2dd715f6a8b79dc148f228929680a812413d25a9100eec8b

                • C:\Users\Admin\AppData\Roaming\Windows Defender Security.exe

                  Filesize

                  659KB

                  MD5

                  64d8e9454e6aee8ab06ff04de44b5a78

                  SHA1

                  ec3882f5fcd42fb5cba64f36c8e8aad053ce0809

                  SHA256

                  88328daff21d049a4b50d0a997e747efe559faa8a6345f6637730ad5679311e1

                  SHA512

                  ece5de5ecf5ad8b4db363a8701206ac47b76e313368ce3bf30a5b22634ac3ff621d348be5441ed85c2adf61a405b6917dde2cb793e3095a9c71d26378d8dc7d8

                • C:\Users\Admin\AppData\Roaming\Windows Update.exe

                  Filesize

                  560KB

                  MD5

                  a1840a96c2aac71cc19d6d16e79ed089

                  SHA1

                  a5e6648c4424385954a9bf0d5680006c7ff959fc

                  SHA256

                  4b522519d68c7a32d1586526f74a5cc5b84827a0c606d2ea21b064d893016e86

                  SHA512

                  e3c779077adea0081d38da4c6601e3d130c514cbb7bf21be353a7fbf0d1e6fb321b8278e08386f90b7d7ee19f6a340e0b273e75fe5f9edea985920cb421dc229

                • memory/324-42-0x0000000074FA0000-0x0000000075551000-memory.dmp

                  Filesize

                  5.7MB

                • memory/324-2-0x0000000074FA0000-0x0000000075551000-memory.dmp

                  Filesize

                  5.7MB

                • memory/324-0-0x0000000074FA1000-0x0000000074FA2000-memory.dmp

                  Filesize

                  4KB

                • memory/324-1-0x0000000074FA0000-0x0000000075551000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1076-60-0x0000000005670000-0x00000000056D6000-memory.dmp

                  Filesize

                  408KB

                • memory/1076-53-0x0000000000400000-0x000000000048C000-memory.dmp

                  Filesize

                  560KB

                • memory/1076-62-0x0000000006AF0000-0x0000000006B2C000-memory.dmp

                  Filesize

                  240KB

                • memory/1076-61-0x0000000006340000-0x0000000006352000-memory.dmp

                  Filesize

                  72KB

                • memory/3000-45-0x000002125FE10000-0x000002125FEBC000-memory.dmp

                  Filesize

                  688KB

                • memory/3000-44-0x00007FF9FE7D3000-0x00007FF9FE7D5000-memory.dmp

                  Filesize

                  8KB

                • memory/3364-130-0x0000000007030000-0x000000000704A000-memory.dmp

                  Filesize

                  104KB

                • memory/3364-131-0x00000000070A0000-0x00000000070AA000-memory.dmp

                  Filesize

                  40KB

                • memory/3364-134-0x0000000007270000-0x000000000727E000-memory.dmp

                  Filesize

                  56KB

                • memory/3364-135-0x0000000007280000-0x0000000007295000-memory.dmp

                  Filesize

                  84KB

                • memory/3364-136-0x0000000007390000-0x00000000073AA000-memory.dmp

                  Filesize

                  104KB

                • memory/3364-82-0x0000000004FD0000-0x00000000055FA000-memory.dmp

                  Filesize

                  6.2MB

                • memory/3364-119-0x00000000705F0000-0x000000007063C000-memory.dmp

                  Filesize

                  304KB

                • memory/3364-93-0x0000000005840000-0x0000000005B97000-memory.dmp

                  Filesize

                  3.3MB

                • memory/3364-103-0x00000000062C0000-0x000000000630C000-memory.dmp

                  Filesize

                  304KB

                • memory/3364-102-0x0000000005CE0000-0x0000000005CFE000-memory.dmp

                  Filesize

                  120KB

                • memory/3848-120-0x0000000006B80000-0x0000000006C24000-memory.dmp

                  Filesize

                  656KB

                • memory/3848-132-0x0000000007170000-0x0000000007206000-memory.dmp

                  Filesize

                  600KB

                • memory/3848-83-0x0000000004CF0000-0x0000000004D12000-memory.dmp

                  Filesize

                  136KB

                • memory/3848-108-0x0000000006B10000-0x0000000006B44000-memory.dmp

                  Filesize

                  208KB

                • memory/3848-109-0x00000000705F0000-0x000000007063C000-memory.dmp

                  Filesize

                  304KB

                • memory/3848-84-0x0000000004E10000-0x0000000004E76000-memory.dmp

                  Filesize

                  408KB

                • memory/3848-118-0x0000000006B50000-0x0000000006B6E000-memory.dmp

                  Filesize

                  120KB

                • memory/3848-81-0x0000000002390000-0x00000000023C6000-memory.dmp

                  Filesize

                  216KB

                • memory/3848-129-0x0000000007520000-0x0000000007B9A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/3848-137-0x0000000007220000-0x0000000007228000-memory.dmp

                  Filesize

                  32KB

                • memory/3848-133-0x00000000070F0000-0x0000000007101000-memory.dmp

                  Filesize

                  68KB

                • memory/3932-46-0x0000000000FB0000-0x000000000105C000-memory.dmp

                  Filesize

                  688KB

                • memory/3932-41-0x000000007202E000-0x000000007202F000-memory.dmp

                  Filesize

                  4KB

                • memory/4020-105-0x0000000006710000-0x000000000671A000-memory.dmp

                  Filesize

                  40KB

                • memory/4592-56-0x0000000000400000-0x000000000048C000-memory.dmp

                  Filesize

                  560KB

                • memory/4948-59-0x0000000072020000-0x00000000727D1000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4948-52-0x0000000005590000-0x000000000559A000-memory.dmp

                  Filesize

                  40KB

                • memory/4948-50-0x0000000005710000-0x00000000057AC000-memory.dmp

                  Filesize

                  624KB

                • memory/4948-49-0x0000000005670000-0x0000000005702000-memory.dmp

                  Filesize

                  584KB

                • memory/4948-48-0x0000000005C20000-0x00000000061C6000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4948-47-0x0000000000BF0000-0x0000000000C82000-memory.dmp

                  Filesize

                  584KB

                • memory/4948-43-0x0000000072020000-0x00000000727D1000-memory.dmp

                  Filesize

                  7.7MB