Overview
overview
10Static
static
10zvgfd-main...iz.bat
windows10-2004-x64
1zvgfd-main...lt.exe
windows10-2004-x64
zvgfd-main/Client.bat
windows10-2004-x64
10zvgfd-main...lt.exe
windows10-2004-x64
zvgfd-main... .exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...ve.bat
windows10-2004-x64
10zvgfd-main...ve.exe
windows10-2004-x64
10zvgfd-main...ke.bat
windows10-2004-x64
10zvgfd-main...V2.exe
windows10-2004-x64
10zvgfd-main...ll.exe
windows10-2004-x64
10zvgfd-main...up.exe
windows10-2004-x64
8zvgfd-main/Output.exe
windows10-2004-x64
10zvgfd-main/Part 1.bat
windows10-2004-x64
10zvgfd-main/Part 2.bat
windows10-2004-x64
1zvgfd-main...om.exe
windows10-2004-x64
1zvgfd-main...er.exe
windows10-2004-x64
10zvgfd-main/Server.exe
windows10-2004-x64
10zvgfd-main/Uni.exe
windows10-2004-x64
10zvgfd-main/Uni.exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...ol.exe
windows10-2004-x64
10zvgfd-main...nt.exe
windows10-2004-x64
10zvgfd-main...st.exe
windows10-2004-x64
10zvgfd-main/asjdfg.exe
windows10-2004-x64
10zvgfd-main...-3.dll
windows10-2004-x64
3zvgfd-main...h2.dll
windows10-2004-x64
3zvgfd-main...-3.dll
windows10-2004-x64
1zvgfd-main/main.exe
windows10-2004-x64
7zvgfd-main/ncat.exe
windows10-2004-x64
1zvgfd-main...ad.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
zvgfd-main/Are You Skibidy, The Quiz.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
zvgfd-main/Client-built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
zvgfd-main/Client.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
zvgfd-main/Client_built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
zvgfd-main/Empyrean Removal Tool .exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
zvgfd-main/Empyrean Removal Tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
zvgfd-main/Empyrean Removal Tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
zvgfd-main/Fanta.Live.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
zvgfd-main/Fanta.Live.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral10
Sample
zvgfd-main/Fanta_Is_Better_Than_Coke.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
zvgfd-main/Frozen Loader V2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
zvgfd-main/Install.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
zvgfd-main/OperaGXSetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
zvgfd-main/Output.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
zvgfd-main/Part 1.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
zvgfd-main/Part 2.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
zvgfd-main/Phantom.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral18
Sample
zvgfd-main/PyMain Installer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
zvgfd-main/Server.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
zvgfd-main/Uni.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
zvgfd-main/Uni.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
zvgfd-main/VIrus removal tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
zvgfd-main/Virus removal tool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
zvgfd-main/XClient.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
zvgfd-main/XClientTest.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
zvgfd-main/asjdfg.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
zvgfd-main/libcrypto-3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
zvgfd-main/libssh2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
zvgfd-main/libssl-3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
zvgfd-main/main.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
zvgfd-main/ncat.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
zvgfd-main/payload.exe
Resource
win10v2004-20240709-en
General
-
Target
zvgfd-main/Uni.exe
-
Size
409KB
-
MD5
9fa86a10b1b1f922b1c6d8dd29e5a7cd
-
SHA1
d781a9aa91476b580560d74f7006078edfdc43e6
-
SHA256
9dfb4ce1fd8968e9f6114fefedbcf8f606893f30bf5968c59dacba1793f1a3dd
-
SHA512
89f845d808f280f237b62d10faf8f8767d20895e7efecc0c9162120a2d219f73e96ff64d95413ffb0f7722fd6215941c7529715a7778873eb180c4e41493f388
-
SSDEEP
6144:+M+lpdRJjGq/lDhLKL4qHYPLvQCgwJx09cb9ifNcZFvl8fOSYTa7ix:spbJjGufLKL4OYOUvlcOSY0ix
Malware Config
Extracted
quasar
3.1.5
Slave
127.0.0.1:4480
192.168.1.120:4480
75.24.104.157:4480
$Sxr-kl1r656AGsPQksTmi8
-
encryption_key
2jMDCHsKUAA3I4prFbxo
-
install_name
$77-LogAGI.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
77-Recovery
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral21/memory/1616-1-0x0000000000660000-0x00000000006CC000-memory.dmp family_quasar behavioral21/files/0x0008000000023445-11.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4392 $77-LogAGI.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe Uni.exe File opened for modification C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe Uni.exe File opened for modification C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe $77-LogAGI.exe File opened for modification C:\Windows\SysWOW64\77-Recovery $77-LogAGI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1092 schtasks.exe 3956 schtasks.exe 2372 SCHTASKS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1616 Uni.exe Token: SeDebugPrivilege 4392 $77-LogAGI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4392 $77-LogAGI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3956 1616 Uni.exe 85 PID 1616 wrote to memory of 3956 1616 Uni.exe 85 PID 1616 wrote to memory of 3956 1616 Uni.exe 85 PID 1616 wrote to memory of 4392 1616 Uni.exe 87 PID 1616 wrote to memory of 4392 1616 Uni.exe 87 PID 1616 wrote to memory of 4392 1616 Uni.exe 87 PID 1616 wrote to memory of 2372 1616 Uni.exe 88 PID 1616 wrote to memory of 2372 1616 Uni.exe 88 PID 1616 wrote to memory of 2372 1616 Uni.exe 88 PID 4392 wrote to memory of 1092 4392 $77-LogAGI.exe 90 PID 4392 wrote to memory of 1092 4392 $77-LogAGI.exe 90 PID 4392 wrote to memory of 1092 4392 $77-LogAGI.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe"C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3956
-
-
C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe"C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Windows\SysWOW64\77-Recovery\$77-LogAGI.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1092
-
-
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Uni.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Uni.exe'" /sc onlogon /rl HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD59fa86a10b1b1f922b1c6d8dd29e5a7cd
SHA1d781a9aa91476b580560d74f7006078edfdc43e6
SHA2569dfb4ce1fd8968e9f6114fefedbcf8f606893f30bf5968c59dacba1793f1a3dd
SHA51289f845d808f280f237b62d10faf8f8767d20895e7efecc0c9162120a2d219f73e96ff64d95413ffb0f7722fd6215941c7529715a7778873eb180c4e41493f388