Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2024, 23:55
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241023-en
General
-
Target
Client-built.exe
-
Size
502KB
-
MD5
9df20812514dfcb87a556a5ef71d72bc
-
SHA1
798340d0ab815844690c29db3e791537690b752a
-
SHA256
e352a653ea9ba91b1d3d6c3c71695c27b4c0fa0ab90ed1c23cbbd2a22b9efece
-
SHA512
784f850c7abfb9d8d128cfdd906f7d1856898b6ffb58d9a6e86bd1ea629f2574f683f3cd60d0defdd8eea244705f81248f55d27827271f34a26e77250be64398
-
SSDEEP
12288:RTEgdfYnxUjmOad344ywgmpaO+gQvcdS:SUwMAd/ywgmpaO+gQvcdS
Malware Config
Extracted
quasar
1.4.0
Office04
192.168.56.1:4782
0623266f-d360-4056-9f63-ed81b7a11fdf
-
encryption_key
CAC47E124130EBD3A11EBA5B8DAA79439482A0B5
-
install_name
Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Broker
-
subdirectory
Broker
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1268-1-0x0000000000DA0000-0x0000000000E24000-memory.dmp family_quasar behavioral1/files/0x000900000001755b-4.dat family_quasar behavioral1/memory/2396-7-0x0000000000080000-0x0000000000104000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2396 Broker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1652 schtasks.exe 2556 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1268 Client-built.exe Token: SeDebugPrivilege 2396 Broker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2396 Broker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1652 1268 Client-built.exe 31 PID 1268 wrote to memory of 1652 1268 Client-built.exe 31 PID 1268 wrote to memory of 1652 1268 Client-built.exe 31 PID 1268 wrote to memory of 2396 1268 Client-built.exe 33 PID 1268 wrote to memory of 2396 1268 Client-built.exe 33 PID 1268 wrote to memory of 2396 1268 Client-built.exe 33 PID 2396 wrote to memory of 2556 2396 Broker.exe 34 PID 2396 wrote to memory of 2556 2396 Broker.exe 34 PID 2396 wrote to memory of 2556 2396 Broker.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Client-built.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\Broker\Broker.exe"C:\Users\Admin\AppData\Roaming\Broker\Broker.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Broker\Broker.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502KB
MD59df20812514dfcb87a556a5ef71d72bc
SHA1798340d0ab815844690c29db3e791537690b752a
SHA256e352a653ea9ba91b1d3d6c3c71695c27b4c0fa0ab90ed1c23cbbd2a22b9efece
SHA512784f850c7abfb9d8d128cfdd906f7d1856898b6ffb58d9a6e86bd1ea629f2574f683f3cd60d0defdd8eea244705f81248f55d27827271f34a26e77250be64398