Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 01:47
Behavioral task
behavioral1
Sample
d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe
Resource
win7-20240708-en
General
-
Target
d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe
-
Size
3.3MB
-
MD5
e089ca24836249976e2d5dca3678e807
-
SHA1
8cf9c018fc37aa609b08d49de20e9856b643305b
-
SHA256
d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f
-
SHA512
76173c832baf4f003f7a2242b1daa8e4021320040de84125d1796c8b67dc2582b607efa77d386db38f6eda5dec892c9fc947b1930695d14687391537aa060f5a
-
SSDEEP
49152:pvPI22SsaNYfdPBldt698dBcjHkxOEMk8k/JxpoGdCYTHHB72eh2NTf:pvA22SsaNYfdPBldt6+dBcjHkxnby
Malware Config
Extracted
quasar
1.4.1
Office04
173.214.167.207:4782
feefbbd1-f830-4abb-beee-ba55da8cb629
-
encryption_key
51CB1F5A5C66153C4F993F7F3638B35B3A7597B3
-
install_name
DefenderScan.exe
-
log_directory
init
-
reconnect_delay
3000
-
startup_key
Defender
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2304-1-0x0000000001100000-0x000000000144C000-memory.dmp family_quasar behavioral1/files/0x0007000000016688-6.dat family_quasar behavioral1/memory/2500-7-0x00000000003C0000-0x000000000070C000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
Processes:
DefenderScan.exepid Process 2500 DefenderScan.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exeDefenderScan.exedescription pid Process Token: SeDebugPrivilege 2304 d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe Token: SeDebugPrivilege 2500 DefenderScan.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
DefenderScan.exepid Process 2500 DefenderScan.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exedescription pid Process procid_target PID 2304 wrote to memory of 2500 2304 d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe 31 PID 2304 wrote to memory of 2500 2304 d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe 31 PID 2304 wrote to memory of 2500 2304 d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe"C:\Users\Admin\AppData\Local\Temp\d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\SubDir\DefenderScan.exe"C:\Users\Admin\AppData\Roaming\SubDir\DefenderScan.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5e089ca24836249976e2d5dca3678e807
SHA18cf9c018fc37aa609b08d49de20e9856b643305b
SHA256d600758023374f78d58acafbcaf94af66ad203b28e22a305e2a9d53768b7030f
SHA51276173c832baf4f003f7a2242b1daa8e4021320040de84125d1796c8b67dc2582b607efa77d386db38f6eda5dec892c9fc947b1930695d14687391537aa060f5a