Analysis

  • max time kernel
    1794s
  • max time network
    1798s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 01:03

General

  • Target

    das.exe

  • Size

    3.2MB

  • MD5

    fc9dc72efa9a2558f092277889483177

  • SHA1

    ae8629a0c0f52c3e6d2aaafc5b2e1f1bbd477747

  • SHA256

    fe3a99da0e96c690ea206dd08b6deb4bb53acd214118f59229e37d00aa0d5b73

  • SHA512

    4329fc1e1b6c556f628c9f3bdcab2e34ebe5a4fade9dcac59010581389613af19e1f8afffaeb495d952dc67dc591ae5c270c79ceafe6ec8e0f4b5b97f31df255

  • SSDEEP

    49152:dTM2IVKyc1Egr0NBwq2dpOyMN5zAI24A8cSSa9+VYt2S6SMrM0LJxIuXwsL:dTcVKyc300q2dpVMH7HBcKmbJWuXwsL

Malware Config

Extracted

Family

xworm

C2

important-machines.gl.at.ply.gg:7974

Attributes
  • Install_directory

    %Public%

  • install_file

    USB.exe

Extracted

Family

quasar

Version

1.4.1

Botnet

dumby bo got ratted LOLOL

C2

p-surplus.gl.at.ply.gg:7938

Mutex

6f229673-e6d0-41b5-a1e4-1cbc29eeffd8

Attributes
  • encryption_key

    84EEFDB37698E582E7732B4568EC490426D1D6DF

  • install_name

    d1aler.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Java updater

  • subdirectory

    SubDir

Signatures

  • Detect Xworm Payload 6 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Drops startup file 3 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\das.exe
    "C:\Users\Admin\AppData\Local\Temp\das.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG0AaABlACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHIAZQB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAbABzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAcwBwACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2360
    • C:\Users\Admin\AppData\Local\Temp\adsdas.exe
      "C:\Users\Admin\AppData\Local\Temp\adsdas.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RegEdit" /tr "C:\Users\Public\RegEdit"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1500
    • C:\Users\Admin\AppData\Local\Temp\RegEdit.exe
      "C:\Users\Admin\AppData\Local\Temp\RegEdit.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Runs regedit.exe
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\d1aler.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2636
      • C:\Windows\system32\SubDir\d1aler.exe
        "C:\Windows\system32\SubDir\d1aler.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\system32\schtasks.exe
          "schtasks" /create /tn "Java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\d1aler.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1732
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {63E8D451-A4CC-4B40-B06A-E973302BF1B2} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Public\RegEdit
      C:\Users\Public\RegEdit
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:604
    • C:\Users\Public\RegEdit
      C:\Users\Public\RegEdit
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1044
    • C:\Users\Public\RegEdit
      C:\Users\Public\RegEdit
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1612
    • C:\Users\Public\RegEdit
      C:\Users\Public\RegEdit
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RegEdit" /tr "C:\Users\Public\RegEdit"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\adsdas.exe

    Filesize

    76KB

    MD5

    614861a9ba2fcb5116a7882fac727556

    SHA1

    93421896f28e1b879ef4bed5803e1492b1e0c657

    SHA256

    5adf655e3c1cd454ea3575c60ccddfe9c7cbe4b67c2eacbca3987e06cef595ac

    SHA512

    41abb5fbb09109e9947713d8559f5d61e4e1f1037b5d26fe929ae69ce6f9bdb86dc278b5f37bd56f1a75a33b144fcd834e836f73ea2ecab96aeab632a82845e9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RegEdit.lnk

    Filesize

    895B

    MD5

    32863e35cd203d77baa7a00369d89704

    SHA1

    9854537a7804b021b413f1508ceaa12ee60a742c

    SHA256

    2247597cdfb82c18f7520f6379d53548d41c51db81b94d0072a2742e7289e532

    SHA512

    4d022279a53f86632b8f5a395d21f35b13fbd1606f12091076239d5d185ca1a10e20b26ea5ef6e5f6949d4e9f15625ef81037ad426480a10a533ce7d3d7d0901

  • \Users\Admin\AppData\Local\Temp\RegEdit.exe

    Filesize

    3.1MB

    MD5

    bfacb0c11a720d61c03412d7f68fb8df

    SHA1

    06c5304b3d6d75734ae3f8f30c9486dd855f0335

    SHA256

    e8156e44befb5335f9c18acdd0d428c3a8fa316546a71fbbbd2c64c08f697a3e

    SHA512

    89a8dcf157e7b390f946925273d34c3f6bf2cdef62e2908f96ceb64e4dbd12d5cb353c7b0e2a37ff59187dd33d3c95ab640295c433ff8e4df760baca3a127cda

  • memory/604-28-0x00000000008A0000-0x00000000008BA000-memory.dmp

    Filesize

    104KB

  • memory/1044-33-0x0000000000CB0000-0x0000000000CCA000-memory.dmp

    Filesize

    104KB

  • memory/1612-35-0x0000000000200000-0x000000000021A000-memory.dmp

    Filesize

    104KB

  • memory/1936-14-0x0000000000E40000-0x0000000000E5A000-memory.dmp

    Filesize

    104KB

  • memory/2816-15-0x0000000000860000-0x0000000000B84000-memory.dmp

    Filesize

    3.1MB

  • memory/2876-38-0x0000000000BC0000-0x0000000000BDA000-memory.dmp

    Filesize

    104KB

  • memory/2896-21-0x00000000000D0000-0x00000000003F4000-memory.dmp

    Filesize

    3.1MB