Analysis
-
max time kernel
40s -
max time network
40s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
27-11-2024 00:52
Behavioral task
behavioral1
Sample
RegEdit.exe
Resource
win10ltsc2021-20241023-en
Errors
General
-
Target
RegEdit.exe
-
Size
3.1MB
-
MD5
bfacb0c11a720d61c03412d7f68fb8df
-
SHA1
06c5304b3d6d75734ae3f8f30c9486dd855f0335
-
SHA256
e8156e44befb5335f9c18acdd0d428c3a8fa316546a71fbbbd2c64c08f697a3e
-
SHA512
89a8dcf157e7b390f946925273d34c3f6bf2cdef62e2908f96ceb64e4dbd12d5cb353c7b0e2a37ff59187dd33d3c95ab640295c433ff8e4df760baca3a127cda
-
SSDEEP
49152:uvHI22SsaNYfdPBldt698dBcjHqEFlymzknoGd9UTHHB72eh2NT:uvo22SsaNYfdPBldt6+dBcjHqEFlE
Malware Config
Extracted
quasar
1.4.1
dumby bo got ratted LOLOL
p-surplus.gl.at.ply.gg:7938
6f229673-e6d0-41b5-a1e4-1cbc29eeffd8
-
encryption_key
84EEFDB37698E582E7732B4568EC490426D1D6DF
-
install_name
d1aler.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java updater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4380-1-0x0000000000C40000-0x0000000000F64000-memory.dmp family_quasar behavioral1/files/0x00280000000450e9-3.dat family_quasar -
Executes dropped EXE 1 IoCs
Processes:
d1aler.exepid Process 228 d1aler.exe -
Drops file in System32 directory 5 IoCs
Processes:
RegEdit.exed1aler.exedescription ioc Process File created C:\Windows\system32\SubDir\d1aler.exe RegEdit.exe File opened for modification C:\Windows\system32\SubDir\d1aler.exe RegEdit.exe File opened for modification C:\Windows\system32\SubDir RegEdit.exe File opened for modification C:\Windows\system32\SubDir\d1aler.exe d1aler.exe File opened for modification C:\Windows\system32\SubDir d1aler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "70" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe -
Runs regedit.exe 1 IoCs
Processes:
RegEdit.exepid Process 4380 RegEdit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 2412 schtasks.exe 4768 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegEdit.exed1aler.exedescription pid Process Token: SeDebugPrivilege 4380 RegEdit.exe Token: SeDebugPrivilege 228 d1aler.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
d1aler.exepid Process 228 d1aler.exe 228 d1aler.exe 228 d1aler.exe 228 d1aler.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
d1aler.exepid Process 228 d1aler.exe 228 d1aler.exe 228 d1aler.exe 228 d1aler.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d1aler.exeLogonUI.exepid Process 228 d1aler.exe 2272 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
RegEdit.exed1aler.exedescription pid Process procid_target PID 4380 wrote to memory of 2412 4380 RegEdit.exe 80 PID 4380 wrote to memory of 2412 4380 RegEdit.exe 80 PID 4380 wrote to memory of 228 4380 RegEdit.exe 82 PID 4380 wrote to memory of 228 4380 RegEdit.exe 82 PID 228 wrote to memory of 4768 228 d1aler.exe 83 PID 228 wrote to memory of 4768 228 d1aler.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RegEdit.exe"C:\Users\Admin\AppData\Local\Temp\RegEdit.exe"1⤵
- Drops file in System32 directory
- Runs regedit.exe
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\d1aler.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2412
-
-
C:\Windows\system32\SubDir\d1aler.exe"C:\Windows\system32\SubDir\d1aler.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\d1aler.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4768
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a1c055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5bfacb0c11a720d61c03412d7f68fb8df
SHA106c5304b3d6d75734ae3f8f30c9486dd855f0335
SHA256e8156e44befb5335f9c18acdd0d428c3a8fa316546a71fbbbd2c64c08f697a3e
SHA51289a8dcf157e7b390f946925273d34c3f6bf2cdef62e2908f96ceb64e4dbd12d5cb353c7b0e2a37ff59187dd33d3c95ab640295c433ff8e4df760baca3a127cda