Overview
overview
10Static
static
10autodist_p...lt.exe
windows7-x64
10autodist_p...lt.exe
windows10-2004-x64
10autodist_p...nt.exe
windows7-x64
3autodist_p...nt.exe
windows10-2004-x64
10autodist_p...1).exe
windows7-x64
3autodist_p...1).exe
windows10-2004-x64
3autodist_p...2).exe
windows7-x64
3autodist_p...2).exe
windows10-2004-x64
3autodist_p...ks.exe
windows7-x64
3autodist_p...ks.exe
windows10-2004-x64
3autodist_p...il.dll
windows7-x64
1autodist_p...il.dll
windows10-2004-x64
1autodist_p...at.dll
windows7-x64
1autodist_p...at.dll
windows10-2004-x64
1autodist_p...mp.exe
windows7-x64
10autodist_p...mp.exe
windows10-2004-x64
10autodist_p...ib.dll
windows7-x64
1autodist_p...ib.dll
windows10-2004-x64
1autodist_p...nt.exe
windows7-x64
3autodist_p...nt.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 22:58
Behavioral task
behavioral1
Sample
autodist_proproctor_M2/Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
autodist_proproctor_M2/Client-built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
autodist_proproctor_M2/Client.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
autodist_proproctor_M2/Client.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks (1).exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
autodist_proproctor_M2/Mono.Cecil.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
autodist_proproctor_M2/Mono.Cecil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
autodist_proproctor_M2/Mono.Nat.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
autodist_proproctor_M2/Mono.Nat.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
autodist_proproctor_M2/Quasar.vmp.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
autodist_proproctor_M2/Quasar.vmp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
autodist_proproctor_M2/Vestris.ResourceLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
autodist_proproctor_M2/Vestris.ResourceLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
autodist_proproctor_M2/client.exe
Resource
win7-20240903-en
General
-
Target
autodist_proproctor_M2/Quasar.vmp.exe
-
Size
2.1MB
-
MD5
a0dace1b704c623aba724810af79fb01
-
SHA1
39ccaaa4ed9840a2f8492f0bda615ae9f8e8b8dd
-
SHA256
ef857f86022cd05c7916f9422ea9f731277b33a4c21efd2e2a475d95d6739f6d
-
SHA512
b6ccc516c7b506d4ad8094474c9b558f79a189e0790344aac54f240a9124f13dff7d485fdbcc05d83ea7330ce673f88bd4a51c7c09668cf5a006ca09304054dc
-
SSDEEP
49152:2pz4hkuxPKIviLopYiKfrjhkQSe+Lt6GDA6:EEhkuxCIvikp/KfJkQQlDA6
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Quasar.vmp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Quasar.vmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Quasar.vmp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2788 Quasar.vmp.exe 2788 Quasar.vmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 Quasar.vmp.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2788 Quasar.vmp.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Quasar.vmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\autodist_proproctor_M2\Quasar.vmp.exe"C:\Users\Admin\AppData\Local\Temp\autodist_proproctor_M2\Quasar.vmp.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- System policy modification
PID:2788