Analysis
-
max time kernel
126s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 00:29
Behavioral task
behavioral1
Sample
Spoofers/Cleaner.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Spoofers/Cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Spoofers/PermWoofer.exe
Resource
win7-20240708-en
General
-
Target
Spoofers/PermWoofer.exe
-
Size
3.1MB
-
MD5
b4ac68d3c6cc89ae97e519b9a7241bba
-
SHA1
ced8a4dec2238bc5f2b7ca9ef9fdac0a6cd9108f
-
SHA256
03bc2c340a1081e1521a5c4b92c38756f4de234ac1b1a578556d83737972e343
-
SHA512
8870741c08574945ea43055e6031394af96290348e4e55d3570f937020c49020fc7d61517d9ab9dd42fc65066ba113cb8a31f2d45cff7f7301f8e865d52aa1d5
-
SSDEEP
49152:Kvkt62XlaSFNWPjljiFa2RoUYIibRJ60bR3LoGdjTHHB72eh2NT:Kv462XlaSFNWPjljiFXRoUYIibRJ6+
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.28:4782
03ef2b9a-5389-4312-b3d3-9b6f68cc5386
-
encryption_key
F8A900CD75D848E74023B3A66FA8AA5469C97692
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ahhaa
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral3/memory/2196-1-0x0000000000FA0000-0x00000000012C4000-memory.dmp family_quasar behavioral3/files/0x00360000000160e7-6.dat family_quasar behavioral3/memory/2768-9-0x0000000000330000-0x0000000000654000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2768 Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe 2812 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2196 PermWoofer.exe Token: SeDebugPrivilege 2768 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2764 2196 PermWoofer.exe 30 PID 2196 wrote to memory of 2764 2196 PermWoofer.exe 30 PID 2196 wrote to memory of 2764 2196 PermWoofer.exe 30 PID 2196 wrote to memory of 2768 2196 PermWoofer.exe 32 PID 2196 wrote to memory of 2768 2196 PermWoofer.exe 32 PID 2196 wrote to memory of 2768 2196 PermWoofer.exe 32 PID 2768 wrote to memory of 2812 2768 Client.exe 33 PID 2768 wrote to memory of 2812 2768 Client.exe 33 PID 2768 wrote to memory of 2812 2768 Client.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spoofers\PermWoofer.exe"C:\Users\Admin\AppData\Local\Temp\Spoofers\PermWoofer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "ahhaa" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "ahhaa" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5b4ac68d3c6cc89ae97e519b9a7241bba
SHA1ced8a4dec2238bc5f2b7ca9ef9fdac0a6cd9108f
SHA25603bc2c340a1081e1521a5c4b92c38756f4de234ac1b1a578556d83737972e343
SHA5128870741c08574945ea43055e6031394af96290348e4e55d3570f937020c49020fc7d61517d9ab9dd42fc65066ba113cb8a31f2d45cff7f7301f8e865d52aa1d5