Analysis
-
max time kernel
125s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 23:34
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20240802-en
General
-
Target
svchost.exe
-
Size
409KB
-
MD5
e8d65fc5ddc235ab81a78b0caebe13c8
-
SHA1
f2200ae68ba21fbbf7e854281e4ab636e3a256e3
-
SHA256
41ed0732dc7032c3e345ea7dfa9522803d2b306e1ef149ebdd74f7ecfe9f17e8
-
SHA512
afe6cf22e57eac8589d1e2fbf198eee75795969a5f2e81a804a2569e411a16a161d618e7edc2b816ec55b0bfba4ea9c33f017af51d6f382076c517ab7b93f30c
-
SSDEEP
12288:qpiREGJMIexhVD+R5aa9vM4DRShuISW2JM:uwpJUi39vM4DRAuQ
Malware Config
Extracted
quasar
3.1.5
SeroXen | v3.1.5 |
dating-mpegs.gl.at.ply.gg:6566
$Sxr-jy6vh8CtEJL5ceZuIb
-
encryption_key
M1SAZZUtbnQqZ8RvEnLb
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/2768-1-0x0000000000DC0000-0x0000000000E2C000-memory.dmp family_quasar behavioral2/files/0x0009000000023585-10.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 5052 $sxr-powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\$sxr-seroxen2\$sxr-powershell.exe svchost.exe File opened for modification C:\Windows\SysWOW64\$sxr-seroxen2\$sxr-powershell.exe svchost.exe File opened for modification C:\Windows\SysWOW64\$sxr-seroxen2\$sxr-powershell.exe $sxr-powershell.exe File opened for modification C:\Windows\SysWOW64\$sxr-seroxen2 $sxr-powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $sxr-powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1712 SCHTASKS.exe 1864 schtasks.exe 4244 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 svchost.exe Token: SeDebugPrivilege 5052 $sxr-powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5052 $sxr-powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2768 wrote to memory of 4244 2768 svchost.exe 94 PID 2768 wrote to memory of 4244 2768 svchost.exe 94 PID 2768 wrote to memory of 4244 2768 svchost.exe 94 PID 2768 wrote to memory of 5052 2768 svchost.exe 96 PID 2768 wrote to memory of 5052 2768 svchost.exe 96 PID 2768 wrote to memory of 5052 2768 svchost.exe 96 PID 2768 wrote to memory of 1712 2768 svchost.exe 97 PID 2768 wrote to memory of 1712 2768 svchost.exe 97 PID 2768 wrote to memory of 1712 2768 svchost.exe 97 PID 5052 wrote to memory of 1864 5052 $sxr-powershell.exe 99 PID 5052 wrote to memory of 1864 5052 $sxr-powershell.exe 99 PID 5052 wrote to memory of 1864 5052 $sxr-powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /rl HIGHEST /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4244
-
-
C:\Windows\SysWOW64\$sxr-seroxen2\$sxr-powershell.exe"C:\Windows\SysWOW64\$sxr-seroxen2\$sxr-powershell.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Powershell" /sc ONLOGON /tr "C:\Windows\SysWOW64\$sxr-seroxen2\$sxr-powershell.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1864
-
-
-
C:\Windows\SysWOW64\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77svchost.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\svchost.exe'" /sc onlogon /rl HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4508,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD5e8d65fc5ddc235ab81a78b0caebe13c8
SHA1f2200ae68ba21fbbf7e854281e4ab636e3a256e3
SHA25641ed0732dc7032c3e345ea7dfa9522803d2b306e1ef149ebdd74f7ecfe9f17e8
SHA512afe6cf22e57eac8589d1e2fbf198eee75795969a5f2e81a804a2569e411a16a161d618e7edc2b816ec55b0bfba4ea9c33f017af51d6f382076c517ab7b93f30c