Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2024, 19:07
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
6c0a0f358f0a60055f0426822240fdc6
-
SHA1
8e9bf932812121416df746c4290e6eaf52a6ba83
-
SHA256
1db4785c2e4ffdbc8a18149d6da1ae157cb234e1837e5aae5de5db799825b0fe
-
SHA512
c81992d751e8122e0fe34b5f9dd79220091bcfc2c777421693edf344bfc427f07239e39bf266ab8974f2c2b28463a5e830e42b4401615615202e551903a6dbab
-
SSDEEP
49152:avbI22SsaNYfdPBldt698dBcjHhXYRxkDvJcQoGdPTHHB72eh2NT:avk22SsaNYfdPBldt6+dBcjHEk7
Malware Config
Extracted
quasar
1.4.1
Office04
127.0.0.1:4782
127.0.0.1:80
41dbc4e3-4c49-4e37-971d-bce5c6356d47
-
encryption_key
5446A6EE72AE0400FB80FEE45AC7AEB6FA7DD14B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/852-1-0x00000000000C0000-0x00000000003E4000-memory.dmp family_quasar -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 800 3556 WerFault.exe 114 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 852 Client-built.exe Token: SeShutdownPrivilege 3556 wmplayer.exe Token: SeCreatePagefilePrivilege 3556 wmplayer.exe Token: SeShutdownPrivilege 1796 unregmp2.exe Token: SeCreatePagefilePrivilege 1796 unregmp2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 852 Client-built.exe 3556 wmplayer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 852 Client-built.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2684 3556 wmplayer.exe 115 PID 3556 wrote to memory of 2684 3556 wmplayer.exe 115 PID 3556 wrote to memory of 2684 3556 wmplayer.exe 115 PID 2684 wrote to memory of 1796 2684 unregmp2.exe 116 PID 2684 wrote to memory of 1796 2684 unregmp2.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\CompressInvoke.cmd" "1⤵PID:4452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\CompressInvoke.cmd" "1⤵PID:3460
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 30002⤵
- Program crash
PID:800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3556 -ip 35561⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c374c25875887db7d072033f817b6ce1
SHA13a6d10268f30e42f973dadf044dba7497e05cdaf
SHA25605d47b87b577841cc40db176ea634ec49b0b97066e192e1d48d84bb977e696b6
SHA5126a14f81a300695c09cb335c13155144e562c86bb0ddfdcab641eb3a168877ad3fcc0579ad86162622998928378ea2ffe5a244b3ddbe6c11a959dbb34af374a7d
-
Filesize
1024KB
MD5182d447ba593045192ec7240d68be1cc
SHA168d6fee11bad59754fbc82ae722a56896d86889c
SHA256fc9e3aa54f926926239aa945040956ecc3f119b895749462f357820a0d3776ad
SHA5121a80f1fbf6b1b0d6003059cae6c27648c0279681c4e5581b7a1c1465704ac74e7acffdde2ed5b34553513940642f4eda3c9b81eaf7c98d04c5826f061310a2c1
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5304041feb81f29c21aee85dc1cba8035
SHA1c922b032044ab9ba768699f809afbd66e375c55c
SHA2567333c9d3bc46d6dd6d5a89e66fd2b634c0a527b80e6ea9f82107a118719b079f
SHA512f9fc92f81d3325387822e0ddefa3f90a1d30e651a683a31bfd6b75083c5fc1c27a80e45658ee32c4884f9abb919de7eef7ff0629568bf15d0fd4ac82e8ffa34b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize1KB
MD5fb77fade2ec9d8fb2f80911be1027cd0
SHA185a01813faedaed649443c1cea9ddca86ce935c6
SHA2561a7b6bc23652f74388240d1739e1c79947378ea90342a6ca9d68d3dfd1b1dd00
SHA512991f852e3b15aca80118a69cce0a77046d8850c8b81e342e79808895e5285d148203b13c3d3e2471a0e1f6652093e4cfbf7db6775ae7fe0c6b65b497535f8f7e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms
Filesize3KB
MD55468d449ecdf0af9c55f42502df40653
SHA1cc94076517626817056cba1644a693c49f728c9f
SHA256b5f8857bbb2f852ecec34a89a4d60ee5e4c197cad2ebf0c3a90c5bf61cf0d169
SHA5125e15b4602a2673641efae13a6626d4a040537eb26c3e1c0db4324a6a28631296c44a655c871e34789d3b44603934b8e90ca0b072bf03e925643a9a07a4d79e95