Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
DOX !Aka team gnp.scr
Resource
win7-20240704-en
General
-
Target
DOX !Aka team gnp.scr
-
Size
1.5MB
-
MD5
8cb48770ef48c80f07c8a7a3ef1586ee
-
SHA1
1d1083098c4841ff23e3b040fb209af9887feb59
-
SHA256
8a9718d2658c908e0ced599e637ce1ab27cfc22e43829ae6bcf784a8591825eb
-
SHA512
befee76662064711a8ee60adf9aaaa3ccc3f4203db06974314d3d620d6e65e8789b5c2357bf75cfec5b65eb8258b07fc34887e4f8a632617b2927b2988a3365f
-
SSDEEP
49152:zDjlabwz95bKxxiXIHLyoltXyYfyu7aOCwI:/qw/2xqIHL5tCl7OCwI
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.27:4782
52f67a9c-ccc2-4eec-a61c-1567fbfeab31
-
encryption_key
E57D88E5AA0EFBFC2E93ADCD1BD6BB2BCF4B3BAA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000186e9-7.dat family_quasar behavioral1/memory/2568-15-0x0000000000FB0000-0x00000000012D4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2568 Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2568 Client-built.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2568 1832 DOX !Aka team gnp.scr 31 PID 1832 wrote to memory of 2568 1832 DOX !Aka team gnp.scr 31 PID 1832 wrote to memory of 2568 1832 DOX !Aka team gnp.scr 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOX !Aka team gnp.scr"C:\Users\Admin\AppData\Local\Temp\DOX !Aka team gnp.scr" /S1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56594c1c527c01d4a3031cd531f4d9feb
SHA13ac67da27beeee7089030f45b7b46cd83e8f38d4
SHA2564b751e42cb5775f3ba47a7fdfe6864e3a48d39ed58d3ba678c8a16f8ab741bd1
SHA512d241cc0597c3da66b64a3bfc0479990d4fff506d70f94a656dda620fe426369989e26c54e395b2a82f0cd9b21ad9e3ed9595b927c356b0f7651f0784ac831e38