General
-
Target
Passware Kit Forensic 2021 Pre-patched retail installer.exe
-
Size
381.5MB
-
Sample
241112-2n383awldm
-
MD5
298faa0669e7d439d1ba4a3d641cc619
-
SHA1
093f271f3c1b4b6e6b948ee61b01ac2c7c02a0fd
-
SHA256
344b9876db6b8649b9d65448a715b1923011ea9146e116908eb4d35bd8fa3af6
-
SHA512
0cca0f0e1f1fae77eba6f438ce53c9542811533d9015a24bebaf4fce4ba936a7642c51f25bec74171e60591f10d8bdf7f76e8e49f27e640209b81bdfcfcbda01
-
SSDEEP
6291456:hVqIbo0MM0kYOnyEBVToKg+IKiwA4kB88xU+WDyb/B/22aMBb7WDnexkq50NguO2:6Is0XRBV3LR4B8vm/hqMdWLeW00NgBa
Static task
static1
Behavioral task
behavioral1
Sample
Passware Kit Forensic 2021 Pre-patched retail installer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Passware Kit Forensic 2021 Pre-patched retail installer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Passware Kit Forensic 2021 Pre-patched retail installer.exe
-
Size
381.5MB
-
MD5
298faa0669e7d439d1ba4a3d641cc619
-
SHA1
093f271f3c1b4b6e6b948ee61b01ac2c7c02a0fd
-
SHA256
344b9876db6b8649b9d65448a715b1923011ea9146e116908eb4d35bd8fa3af6
-
SHA512
0cca0f0e1f1fae77eba6f438ce53c9542811533d9015a24bebaf4fce4ba936a7642c51f25bec74171e60591f10d8bdf7f76e8e49f27e640209b81bdfcfcbda01
-
SSDEEP
6291456:hVqIbo0MM0kYOnyEBVToKg+IKiwA4kB88xU+WDyb/B/22aMBb7WDnexkq50NguO2:6Is0XRBV3LR4B8vm/hqMdWLeW00NgBa
-
Quasar family
-
Quasar payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Modify Registry
1System Binary Proxy Execution
1Regsvcs/Regasm
1