Overview
overview
10Static
static
10zvgfd-main...iz.bat
windows10-2004-x64
1zvgfd-main...lt.exe
windows10-2004-x64
zvgfd-main/Client.bat
windows10-2004-x64
10zvgfd-main...lt.exe
windows10-2004-x64
zvgfd-main... .exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...ve.bat
windows10-2004-x64
10zvgfd-main...ve.exe
windows10-2004-x64
10zvgfd-main...ke.bat
windows10-2004-x64
10zvgfd-main...V2.exe
windows10-2004-x64
10zvgfd-main...ll.exe
windows10-2004-x64
10zvgfd-main...up.exe
windows10-2004-x64
8zvgfd-main/Output.exe
windows10-2004-x64
10zvgfd-main/Part 1.bat
windows10-2004-x64
10zvgfd-main/Part 2.bat
windows10-2004-x64
1zvgfd-main...om.exe
windows10-2004-x64
1zvgfd-main...er.exe
windows10-2004-x64
10zvgfd-main/Server.exe
windows10-2004-x64
10zvgfd-main/Uni.exe
windows10-2004-x64
10zvgfd-main/Uni.exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...nt.exe
windows10-2004-x64
10zvgfd-main...st.exe
windows10-2004-x64
10zvgfd-main/asjdfg.exe
windows10-2004-x64
10zvgfd-main...-3.dll
windows10-2004-x64
3zvgfd-main...h2.dll
windows10-2004-x64
3zvgfd-main...-3.dll
windows10-2004-x64
1zvgfd-main/main.exe
windows10-2004-x64
7zvgfd-main/ncat.exe
windows10-2004-x64
1zvgfd-main...ad.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
zvgfd-main/Are You Skibidy, The Quiz.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
zvgfd-main/Client-built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
zvgfd-main/Client.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
zvgfd-main/Client_built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
zvgfd-main/Empyrean Removal Tool .exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
zvgfd-main/Empyrean Removal Tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
zvgfd-main/Empyrean Removal Tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
zvgfd-main/Fanta.Live.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
zvgfd-main/Fanta.Live.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral10
Sample
zvgfd-main/Fanta_Is_Better_Than_Coke.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
zvgfd-main/Frozen Loader V2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
zvgfd-main/Install.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
zvgfd-main/OperaGXSetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
zvgfd-main/Output.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
zvgfd-main/Part 1.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
zvgfd-main/Part 2.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
zvgfd-main/Phantom.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral18
Sample
zvgfd-main/PyMain Installer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
zvgfd-main/Server.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
zvgfd-main/Uni.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
zvgfd-main/Uni.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
zvgfd-main/VIrus removal tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
zvgfd-main/Virus removal tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
zvgfd-main/XClient.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
zvgfd-main/XClientTest.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
zvgfd-main/asjdfg.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
zvgfd-main/libcrypto-3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
zvgfd-main/libssh2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
zvgfd-main/libssl-3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
zvgfd-main/main.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
zvgfd-main/ncat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
zvgfd-main/payload.exe
Resource
win10v2004-20240709-en
General
-
Target
zvgfd-main/Uni.exe
-
Size
409KB
-
MD5
63406415832d298e8419d037141b99a5
-
SHA1
e8269627e0605dd626494dc50dbba8c7a5a19fa9
-
SHA256
171e372c9879e2396f14cc0b1388c129a1c8c2d526f74cdd6c18822dfc8f3eae
-
SHA512
6a4f7026cf6702b3c75a144deb8ea31ee65842eaefa9eb2a1c5254053654666b255105f01ad81dbee8268ee983c1e1ea0980f40a2f29e3e784fed87efc09366f
-
SSDEEP
12288:VpbJjGuHOGpmeptoiwkZvaXlrWYveGTzse:LVau8ez0dpT/
Malware Config
Extracted
quasar
3.1.5
Slave
127.0.0.1:4480
192.168.1.120:4480
75.24.104.157:4480
$Sxr-kl1r656AGsPQksTmi8
-
encryption_key
2jMDCHsKUAA3I4prFbxo
-
install_name
$77-LogAGI.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
77-Recovery
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral20/memory/4024-1-0x0000000000EE0000-0x0000000000F4C000-memory.dmp family_quasar behavioral20/files/0x00090000000234ad-11.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3364 $77-LogAGI.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe Uni.exe File opened for modification C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe Uni.exe File opened for modification C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe $77-LogAGI.exe File opened for modification C:\Windows\SysWOW64\77-Recovery $77-LogAGI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2288 schtasks.exe 2368 schtasks.exe 4820 SCHTASKS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4024 Uni.exe Token: SeDebugPrivilege 3364 $77-LogAGI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3364 $77-LogAGI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2288 4024 Uni.exe 85 PID 4024 wrote to memory of 2288 4024 Uni.exe 85 PID 4024 wrote to memory of 2288 4024 Uni.exe 85 PID 4024 wrote to memory of 3364 4024 Uni.exe 87 PID 4024 wrote to memory of 3364 4024 Uni.exe 87 PID 4024 wrote to memory of 3364 4024 Uni.exe 87 PID 3364 wrote to memory of 2368 3364 $77-LogAGI.exe 88 PID 3364 wrote to memory of 2368 3364 $77-LogAGI.exe 88 PID 3364 wrote to memory of 2368 3364 $77-LogAGI.exe 88 PID 4024 wrote to memory of 4820 4024 Uni.exe 90 PID 4024 wrote to memory of 4820 4024 Uni.exe 90 PID 4024 wrote to memory of 4820 4024 Uni.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe"C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2288
-
-
C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe"C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe'" /sc onlogon /rl HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:4820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD59fa86a10b1b1f922b1c6d8dd29e5a7cd
SHA1d781a9aa91476b580560d74f7006078edfdc43e6
SHA2569dfb4ce1fd8968e9f6114fefedbcf8f606893f30bf5968c59dacba1793f1a3dd
SHA51289f845d808f280f237b62d10faf8f8767d20895e7efecc0c9162120a2d219f73e96ff64d95413ffb0f7722fd6215941c7529715a7778873eb180c4e41493f388