Overview
overview
10Static
static
3NordUpdateService.exe
windows7-x64
1NordUpdateService.exe
windows10-2004-x64
10Otago_IB.lnk
windows7-x64
3Otago_IB.lnk
windows10-2004-x64
10Otago_IB_Conf.lnk
windows7-x64
3Otago_IB_Conf.lnk
windows10-2004-x64
10Otago_IB_C...e.pptx
windows7-x64
3Otago_IB_C...e.pptx
windows10-2004-x64
1mscoree.dll
windows7-x64
1mscoree.dll
windows10-2004-x64
10Analysis
-
max time kernel
129s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 11:31
Static task
static1
Behavioral task
behavioral1
Sample
NordUpdateService.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
NordUpdateService.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Otago_IB.lnk
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Otago_IB.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Otago_IB_Conf.lnk
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Otago_IB_Conf.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Otago_IB_Conference.pptx
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Otago_IB_Conference.pptx
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
mscoree.dll
Resource
win7-20240729-en
General
-
Target
Otago_IB_Conf.lnk
-
Size
1KB
-
MD5
4af014550fcfd0cb5a60d18d3e339654
-
SHA1
f7cd52bf3c622c2784dcb7dbb0e39d9bbbcb2fef
-
SHA256
43be8f7868bd8a976ca55757b5253b577012e02e75798225d76cf1111b401668
-
SHA512
3690164c4cb64328f73c15ccc5c43b5fed0196ca27f62af40cef608d29e619d1272fb0a31b58de13dde7d67be65f4b2166a55d3dc6e78ccf10665ff175d8e97a
Malware Config
Extracted
quasar
1.4.1
Office04
94.156.69.32:4782
50380dde-34ad-4717-969f-5435a90bc9c0
-
encryption_key
34E5AD2D21D24289CCD1651CD4CE56F37B65DB13
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral6/memory/2964-64-0x0000024E1DD90000-0x0000024E1E0B6000-memory.dmp family_quasar behavioral6/memory/2964-65-0x0000024E38C00000-0x0000024E38F24000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4200 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4200 POWERPNT.EXE 4200 POWERPNT.EXE 4200 POWERPNT.EXE 4200 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 756 wrote to memory of 2008 756 cmd.exe 88 PID 756 wrote to memory of 2008 756 cmd.exe 88 PID 2008 wrote to memory of 1708 2008 cmd.exe 89 PID 2008 wrote to memory of 1708 2008 cmd.exe 89 PID 2008 wrote to memory of 4200 2008 cmd.exe 91 PID 2008 wrote to memory of 4200 2008 cmd.exe 91 PID 2008 wrote to memory of 4200 2008 cmd.exe 91 PID 1708 wrote to memory of 2964 1708 NordUpdateService.exe 104 PID 1708 wrote to memory of 2964 1708 NordUpdateService.exe 104 PID 1708 wrote to memory of 2964 1708 NordUpdateService.exe 104 PID 1708 wrote to memory of 2964 1708 NordUpdateService.exe 104 PID 1708 wrote to memory of 2964 1708 NordUpdateService.exe 104 PID 1708 wrote to memory of 2964 1708 NordUpdateService.exe 104
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Otago_IB_Conf.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "Otago_IB.lnk" && start "" "Otago_IB_Conference.pptx"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\NordUpdateService.exe"C:\Users\Admin\AppData\Local\Temp\NordUpdateService.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SYSTEM32\RuntimeBroker.exeRuntimeBroker.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Otago_IB_Conference.pptx" /ou ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4200
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3980,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4856 /prefetch:81⤵PID:980