Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe
Resource
win7-20241010-en
General
-
Target
76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe
-
Size
476KB
-
MD5
da604719663cbe3104a8e962b6e0c1a4
-
SHA1
e0ce2c871f1d20623c328fb16d7adbb4277f011f
-
SHA256
76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f
-
SHA512
847c1916b35f53a0c5d7afd9770863ed3789eb2468cb3dfdc343e8c61baacbd4679d676c8de79ebe72d38c905922d2f2a958603cd53bc921aece803d9823a287
-
SSDEEP
12288:c3ONTjM4IvtoL1F3Q+9V/xj3CwZQ57YkQ9tnApd:oONjn1djxr5Q57Ykqt
Malware Config
Extracted
quasar
1.4.0.0
winrar
winrar.ydns.eu:4782
bCniKUdDhgLnMojfQG
-
encryption_key
XNz8aG8ZYhW5neohUxbc
-
install_name
Caspol.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
AppLaunch
-
subdirectory
MonitorWindows
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4244-41-0x00000000031A0000-0x00000000031EE000-memory.dmp family_quasar -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4404 powershell.exe 3136 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe -
Executes dropped EXE 1 IoCs
pid Process 4244 taskhostw.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 264 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4404 powershell.exe 4404 powershell.exe 4404 powershell.exe 3136 powershell.exe 3136 powershell.exe 3136 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 716 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe Token: SeBackupPrivilege 4068 vssvc.exe Token: SeRestorePrivilege 4068 vssvc.exe Token: SeAuditPrivilege 4068 vssvc.exe Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 3136 powershell.exe Token: SeDebugPrivilege 4244 taskhostw.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 taskhostw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 716 wrote to memory of 4404 716 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe 103 PID 716 wrote to memory of 4404 716 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe 103 PID 716 wrote to memory of 3136 716 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe 105 PID 716 wrote to memory of 3136 716 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe 105 PID 716 wrote to memory of 1480 716 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe 108 PID 716 wrote to memory of 1480 716 76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe 108 PID 1480 wrote to memory of 264 1480 cmd.exe 110 PID 1480 wrote to memory of 264 1480 cmd.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe"C:\Users\Admin\AppData\Local\Temp\76633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\taskhostw.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskhostw.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA7B.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:264
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
C:\Users\Admin\AppData\Local\Temp\taskhostw.exeC:\Users\Admin\AppData\Local\Temp\taskhostw.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
476KB
MD5da604719663cbe3104a8e962b6e0c1a4
SHA1e0ce2c871f1d20623c328fb16d7adbb4277f011f
SHA25676633ce92246c62bb3df63286aa65e0efb5e6e4bc5bb5f5cf3bdbbc6514c988f
SHA512847c1916b35f53a0c5d7afd9770863ed3789eb2468cb3dfdc343e8c61baacbd4679d676c8de79ebe72d38c905922d2f2a958603cd53bc921aece803d9823a287
-
Filesize
215B
MD573a6d1786c096749153008fb81be7f59
SHA15dc0da28acf6c85195caa3f3e6e53e5f13615b61
SHA2569fb4d74e8e2feaa7b76f4cb21ebd707833e5193db35c62c0a9e2769c9f8f0a45
SHA512b7f55a2dfbfe7b015381c9880c3ac96dc4cc2d98fea1c844350fc0c228532e5b9348a443570476a7c508af8619d368b458e7a910065522b974327d1f9b5aa92c