Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/10/2024, 00:11
Behavioral task
behavioral1
Sample
7u45745967.exe
Resource
win7-20240903-en
General
-
Target
7u45745967.exe
-
Size
3.1MB
-
MD5
dadd4502cec83146bc01bd9e01e9e4ad
-
SHA1
c7c7def14dd5f15e92a4227be4c5ad3af175a2ca
-
SHA256
0f89689dce10772f4f7ad3c2431ec808fd53a40a93314a2a22ef1b63eb21b37b
-
SHA512
4d25597282663c033eadafc755ad2e1f6c6700a601ea0f64f7a8922c41be2aeba3f3d5479a904ed0461ad51ffc3256963b0fbb5c9f8b366a94767b218ef08f8f
-
SSDEEP
49152:GvBt62XlaSFNWPjljiFa2RoUYIioxNESEek/isLoGdI5THHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYINx1y
Malware Config
Extracted
quasar
1.4.1
Office04
4.tcp.us-cal-1.ngrok.io:11073
5ef8baaf-b402-47aa-8c01-abb78e86878b
-
encryption_key
64E5F426F36D28C0743F6DA157D86F7805E54413
-
install_name
LOGI_INT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
LOGI_INT
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1800-1-0x00000000001D0000-0x00000000004F4000-memory.dmp family_quasar behavioral1/files/0x0008000000016c47-6.dat family_quasar behavioral1/memory/2104-10-0x0000000000C30000-0x0000000000F54000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2104 LOGI_INT.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 4.tcp.us-cal-1.ngrok.io -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\SubDir\LOGI_INT.exe 7u45745967.exe File opened for modification C:\Windows\system32\SubDir 7u45745967.exe File opened for modification C:\Windows\system32\SubDir\LOGI_INT.exe LOGI_INT.exe File opened for modification C:\Windows\system32\SubDir LOGI_INT.exe File created C:\Windows\system32\SubDir\LOGI_INT.exe 7u45745967.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2224 schtasks.exe 828 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1800 7u45745967.exe Token: SeDebugPrivilege 2104 LOGI_INT.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2104 LOGI_INT.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1800 wrote to memory of 828 1800 7u45745967.exe 30 PID 1800 wrote to memory of 828 1800 7u45745967.exe 30 PID 1800 wrote to memory of 828 1800 7u45745967.exe 30 PID 1800 wrote to memory of 2104 1800 7u45745967.exe 32 PID 1800 wrote to memory of 2104 1800 7u45745967.exe 32 PID 1800 wrote to memory of 2104 1800 7u45745967.exe 32 PID 2104 wrote to memory of 2224 2104 LOGI_INT.exe 33 PID 2104 wrote to memory of 2224 2104 LOGI_INT.exe 33 PID 2104 wrote to memory of 2224 2104 LOGI_INT.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7u45745967.exe"C:\Users\Admin\AppData\Local\Temp\7u45745967.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "LOGI_INT" /sc ONLOGON /tr "C:\Windows\system32\SubDir\LOGI_INT.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:828
-
-
C:\Windows\system32\SubDir\LOGI_INT.exe"C:\Windows\system32\SubDir\LOGI_INT.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "LOGI_INT" /sc ONLOGON /tr "C:\Windows\system32\SubDir\LOGI_INT.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5dadd4502cec83146bc01bd9e01e9e4ad
SHA1c7c7def14dd5f15e92a4227be4c5ad3af175a2ca
SHA2560f89689dce10772f4f7ad3c2431ec808fd53a40a93314a2a22ef1b63eb21b37b
SHA5124d25597282663c033eadafc755ad2e1f6c6700a601ea0f64f7a8922c41be2aeba3f3d5479a904ed0461ad51ffc3256963b0fbb5c9f8b366a94767b218ef08f8f