Analysis
-
max time kernel
96s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe
Resource
win7-20241010-en
General
-
Target
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe
-
Size
82KB
-
MD5
5405c36dca0a57d8a6632550b0cba212
-
SHA1
9f487e0902b7c39a4c4dd8dd9e918dc3dc10245c
-
SHA256
8d429a2e8f8b5403c44cb7597598c2ba18a40ccb464f2997426d3eefbbd888c0
-
SHA512
c699a965e289613d31f699494328f9570abc61ea437ab199afbb266c923c9383c366e3f4bec1de27614f2d9672de5449ee39e0d3614df3f315a2b64fad2e8e6b
-
SSDEEP
1536:eKPDl0ZVabbkg9ot5dR7GqPoS95sRvWQONAjzGX+:eKPDOZVEbkg6lKC0eBNAjzV
Malware Config
Extracted
quasar
1.4.1
chi
ert43w221.ydns.eu:6298
db1ec7b2-f77c-4b56-b5fd-a1430b0b26b9
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2912-1200-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exedescription pid process target process PID 4328 created 3540 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe Explorer.EXE -
Drops startup file 1 IoCs
Processes:
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DebuggingFlags.vbs RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exedescription pid process target process PID 4328 set thread context of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exeRFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exeInstallUtil.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exepid process 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe Token: SeDebugPrivilege 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe Token: SeDebugPrivilege 2912 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exeInstallUtil.exedescription pid process target process PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 4328 wrote to memory of 2912 4328 RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe InstallUtil.exe PID 2912 wrote to memory of 1464 2912 InstallUtil.exe schtasks.exe PID 2912 wrote to memory of 1464 2912 InstallUtil.exe schtasks.exe PID 2912 wrote to memory of 1464 2912 InstallUtil.exe schtasks.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1464
-
-