Analysis
-
max time kernel
78s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 15:56
Behavioral task
behavioral1
Sample
SpotifyLauncher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
SpotifyLauncher.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
SpotifyLauncher.exe
-
Size
3.1MB
-
MD5
459bd1f40deff63df61baa82b8c053b3
-
SHA1
e08e35044bf8f73b67e54901ad37a4edf33fc319
-
SHA256
812c0beafd8928e2aa6410d1889acecf6b4213614d3fadbfc3fbba295932c9c3
-
SHA512
4232cf3ef7fe0e199a9e673ce785ecdd313ebdd5104d0a016105c7a76d77c350bac623e33d794255b04d989c12436d42850ef95b68452f04f9a7c6109c44130b
-
SSDEEP
49152:+vkt62XlaSFNWPjljiFa2RoUYIlgtCxkkvJrNoGdR5UTHHB72eh2NT:+v462XlaSFNWPjljiFXRoUYIDkcr
Malware Config
Extracted
quasar
1.4.1
filip
192.168.1.171:4782
8a32f315-b6f7-488d-8f1f-fefeb759304a
-
encryption_key
F0287BA2AFF0852B0C114DD06BE24EB4A3DB1A65
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SpotifyLauncher
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/4444-1-0x0000000000CE0000-0x0000000001004000-memory.dmp family_quasar behavioral1/files/0x0008000000023bb9-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4068 Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe 956 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4444 SpotifyLauncher.exe Token: SeDebugPrivilege 4068 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4068 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4520 4444 SpotifyLauncher.exe 85 PID 4444 wrote to memory of 4520 4444 SpotifyLauncher.exe 85 PID 4444 wrote to memory of 4068 4444 SpotifyLauncher.exe 88 PID 4444 wrote to memory of 4068 4444 SpotifyLauncher.exe 88 PID 4068 wrote to memory of 956 4068 Client.exe 90 PID 4068 wrote to memory of 956 4068 Client.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpotifyLauncher.exe"C:\Users\Admin\AppData\Local\Temp\SpotifyLauncher.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SpotifyLauncher" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4520
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SpotifyLauncher" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5459bd1f40deff63df61baa82b8c053b3
SHA1e08e35044bf8f73b67e54901ad37a4edf33fc319
SHA256812c0beafd8928e2aa6410d1889acecf6b4213614d3fadbfc3fbba295932c9c3
SHA5124232cf3ef7fe0e199a9e673ce785ecdd313ebdd5104d0a016105c7a76d77c350bac623e33d794255b04d989c12436d42850ef95b68452f04f9a7c6109c44130b