Analysis

  • max time kernel
    221s
  • max time network
    228s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    10-11-2024 14:41

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    403d20c63335b299c8bcbe4c6e49231e

  • SHA1

    b581c2ca151a033dd10dca736ea76cf29278f498

  • SHA256

    db857bc6602026ddfd794ec8c167ede510ca24d46d1de71fac1357c1f4f34bfb

  • SHA512

    68418311a5e6cf5a81205513cb2beefc164a913c8f361c7405698948977f77ef4e682aeef651844f9e2da1b6fba978d6f5b97f9fe0780d6b0b91d34a0ea6570a

  • SSDEEP

    49152:rvrhBYjCO4Dt2d5aKCuVPzlEmVQL0wvwkadReEErHgk/uVkoGduLTHHB72eh2NT:rvjt2d5aKCuVPzlEmVQ0wvwfdRe6C+

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

gorodpro-37914.portmap.host:37914

Mutex

1c5ec883-e96d-4a3a-9035-7a940d47aeb7

Attributes
  • encryption_key

    99E87F88E9E967A51725453CB8223ADDB8256DE2

  • install_name

    WindowsDefender.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Defender

  • subdirectory

    WindowsDefender

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Windows Defender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2292
    • C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe
      "C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Windows Defender" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4556
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd" /K CHCP 437
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Windows\system32\chcp.com
          CHCP 437
          4⤵
            PID:3200
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\xd.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\WindowsDefender\WindowsDefender.exe

      Filesize

      3.1MB

      MD5

      403d20c63335b299c8bcbe4c6e49231e

      SHA1

      b581c2ca151a033dd10dca736ea76cf29278f498

      SHA256

      db857bc6602026ddfd794ec8c167ede510ca24d46d1de71fac1357c1f4f34bfb

      SHA512

      68418311a5e6cf5a81205513cb2beefc164a913c8f361c7405698948977f77ef4e682aeef651844f9e2da1b6fba978d6f5b97f9fe0780d6b0b91d34a0ea6570a

    • memory/772-0-0x00007FFBE7BE3000-0x00007FFBE7BE5000-memory.dmp

      Filesize

      8KB

    • memory/772-1-0x0000000000770000-0x0000000000A94000-memory.dmp

      Filesize

      3.1MB

    • memory/772-2-0x00007FFBE7BE0000-0x00007FFBE86A2000-memory.dmp

      Filesize

      10.8MB

    • memory/772-5-0x00007FFBE7BE0000-0x00007FFBE86A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3644-7-0x00007FFBE7BE0000-0x00007FFBE86A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3644-6-0x00007FFBE7BE0000-0x00007FFBE86A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3644-8-0x0000000002CB0000-0x0000000002D00000-memory.dmp

      Filesize

      320KB

    • memory/3644-9-0x000000001C840000-0x000000001C8F2000-memory.dmp

      Filesize

      712KB

    • memory/3644-10-0x00007FFBE7BE0000-0x00007FFBE86A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3644-11-0x00007FFBE7BE0000-0x00007FFBE86A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3644-14-0x000000001C780000-0x000000001C792000-memory.dmp

      Filesize

      72KB

    • memory/3644-15-0x000000001C7E0000-0x000000001C81C000-memory.dmp

      Filesize

      240KB

    • memory/3644-16-0x000000001D140000-0x000000001D23F000-memory.dmp

      Filesize

      1020KB

    • memory/3644-33-0x000000001EA10000-0x000000001EF38000-memory.dmp

      Filesize

      5.2MB