Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 19:36
Behavioral task
behavioral1
Sample
niggarab.exe
Resource
win7-20241010-en
General
-
Target
niggarab.exe
-
Size
3.1MB
-
MD5
448ec0f3a024768ba82ca362ac35e54f
-
SHA1
6b0f1d6976283f31ce29c83ce5bc2f5bc2e94a49
-
SHA256
1d540999c78833cce0176eef65096caf459d4cd56472c068ce728868653aac8f
-
SHA512
cbb7fc6143e59c3b376dee87435ae19c987f130926e01d0c8ddf6ce303488047697f35ad3d26d0f55a0894a74271fb9b52beb859959e05f5709dbde75eb8aae7
-
SSDEEP
49152:Xv7cfX2hcawDEhPLl8r/ptXpga584Qx9E1zxk/Jx6oGdRTHHB72eh2NT:Xvwv2hcawDEhPLl8r/XXpga584Qx3U
Malware Config
Extracted
quasar
1.4.1
JaffaCakes лох, сдохнет от спида!!! I hate Niggers
rab1.premium-televizor.net:18651
af92703d-a16f-40c6-8fff-b3793fd59f85
-
encryption_key
0F1B05653C3B3AB3BB4ECD772DD024668CBE8DF1
-
install_name
system32.exe
-
log_directory
Keyboard
-
reconnect_delay
3000
-
startup_key
Trusted Installer
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2648-1-0x0000000000A70000-0x0000000000D94000-memory.dmp family_quasar behavioral1/files/0x000700000001925b-6.dat family_quasar behavioral1/memory/1988-8-0x0000000000800000-0x0000000000B24000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1988 system32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\SubDir\system32.exe niggarab.exe File opened for modification C:\Windows\system32\SubDir\system32.exe niggarab.exe File opened for modification C:\Windows\system32\SubDir niggarab.exe File opened for modification C:\Windows\system32\SubDir\system32.exe system32.exe File opened for modification C:\Windows\system32\SubDir system32.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2372 schtasks.exe 2332 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2648 niggarab.exe Token: SeDebugPrivilege 1988 system32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1988 system32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2372 2648 niggarab.exe 30 PID 2648 wrote to memory of 2372 2648 niggarab.exe 30 PID 2648 wrote to memory of 2372 2648 niggarab.exe 30 PID 2648 wrote to memory of 1988 2648 niggarab.exe 32 PID 2648 wrote to memory of 1988 2648 niggarab.exe 32 PID 2648 wrote to memory of 1988 2648 niggarab.exe 32 PID 1988 wrote to memory of 2332 1988 system32.exe 33 PID 1988 wrote to memory of 2332 1988 system32.exe 33 PID 1988 wrote to memory of 2332 1988 system32.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggarab.exe"C:\Users\Admin\AppData\Local\Temp\niggarab.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Trusted Installer" /sc ONLOGON /tr "C:\Windows\system32\SubDir\system32.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2372
-
-
C:\Windows\system32\SubDir\system32.exe"C:\Windows\system32\SubDir\system32.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Trusted Installer" /sc ONLOGON /tr "C:\Windows\system32\SubDir\system32.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5448ec0f3a024768ba82ca362ac35e54f
SHA16b0f1d6976283f31ce29c83ce5bc2f5bc2e94a49
SHA2561d540999c78833cce0176eef65096caf459d4cd56472c068ce728868653aac8f
SHA512cbb7fc6143e59c3b376dee87435ae19c987f130926e01d0c8ddf6ce303488047697f35ad3d26d0f55a0894a74271fb9b52beb859959e05f5709dbde75eb8aae7