Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-11-2024 02:37
Static task
static1
General
-
Target
PORQUEPUTASYANOSIRVE.7z
-
Size
923KB
-
MD5
d757d40193d311216967491e36fc2ba4
-
SHA1
2dd90fa74c489da4f85bdf301053230b480a31fa
-
SHA256
8a31693ddf8924f144ba19a8802766188bd13f1ed7eea7c226eb0e01a9e47685
-
SHA512
9be26ab222457605eea0c42a4dbcfa80154cb384e6abf0db6a010fcca172a0eda8792b9e3fff9d67717f095f67448d9310c7e049f7fea8dd5907afe8bd462921
-
SSDEEP
24576:q9gl2kNvEE7GFdGqXsShFTAkBojKLUI56eGk:46vbIGqXscAkW+h1
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0028000000045045-2.dat family_quasar behavioral1/memory/1036-5-0x00000000007A0000-0x0000000000AC4000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 1036 PORQUEPUTASYANOSIRVE.exe 2264 Client.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133770623956754599" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe 2480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 960 chrome.exe 960 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 960 chrome.exe 960 chrome.exe 960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeRestorePrivilege 224 7zFM.exe Token: 35 224 7zFM.exe Token: SeSecurityPrivilege 224 7zFM.exe Token: SeDebugPrivilege 1036 PORQUEPUTASYANOSIRVE.exe Token: SeDebugPrivilege 2264 Client.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe Token: SeShutdownPrivilege 960 chrome.exe Token: SeCreatePagefilePrivilege 960 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 224 7zFM.exe 224 7zFM.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe 960 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2264 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2096 1036 PORQUEPUTASYANOSIRVE.exe 91 PID 1036 wrote to memory of 2096 1036 PORQUEPUTASYANOSIRVE.exe 91 PID 1036 wrote to memory of 2264 1036 PORQUEPUTASYANOSIRVE.exe 93 PID 1036 wrote to memory of 2264 1036 PORQUEPUTASYANOSIRVE.exe 93 PID 2264 wrote to memory of 2480 2264 Client.exe 94 PID 2264 wrote to memory of 2480 2264 Client.exe 94 PID 960 wrote to memory of 4576 960 chrome.exe 98 PID 960 wrote to memory of 4576 960 chrome.exe 98 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4772 960 chrome.exe 99 PID 960 wrote to memory of 4460 960 chrome.exe 100 PID 960 wrote to memory of 4460 960 chrome.exe 100 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 PID 960 wrote to memory of 1296 960 chrome.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\PORQUEPUTASYANOSIRVE.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:224
-
C:\Users\Admin\Desktop\PORQUEPUTASYANOSIRVE.exe"C:\Users\Admin\Desktop\PORQUEPUTASYANOSIRVE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2096
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2480
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1f0,0x22c,0x7fffd7a5cc40,0x7fffd7a5cc4c,0x7fffd7a5cc582⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2012,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1856,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2068 /prefetch:32⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2108,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3704,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4856,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,1867624565958439864,6117235928764902475,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5bc96504d6f09367517a15c4094910d44
SHA16e84514a1ba0cf81ed89e7a30c6e476a3515c2a1
SHA2568f0edac5d602e2fa946972b9962bf83f87575bee48221102b64802c12071af1e
SHA512934d39ecbeb27293d3207b9b82af1b9f80df9c845c2a81906ca87ff22b45fa3f26641b6fde468e71936871a5fe8a3b4111cc4a4f4047c5717a950d542aa9dd36
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3.1MB
MD573565f33ed4d8741291cbb30409f1727
SHA14d3a54b28f3ea80f884a25905e27165bdc353109
SHA256aafe953e627f9e733e101d7211f0c9594dbdf82ec4019b2c9aa361cbc478f0de
SHA512d897b098ddcdc94ac9177bc9a90b700c8b9a7cfafa74f729beebf74a094f76a7bd69e764711bdfedcdd231465daef16e937676e391ca2c010df03fecc863b583