Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 03:25
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
c17ff0333852bb47c256d3a448910271
-
SHA1
be09b580de7608f2f1e9013bd16ad5499faf2ce3
-
SHA256
e5963a8de3d81aff5bd3193d5137baa1b9022d6106dc3141f4d99c14e2fbad7e
-
SHA512
1bf1840de9a7547fef877e0986c4a71c0360ea9005a3f85b98836596acc713e6d9764fd9c0a0d7356b0621cb278ec403bf7ac71f8155decb046d14ec4ecd13f5
-
SSDEEP
49152:rvClL26AaNeWgPhlmVqvMQ7XSK7pDGjHmzMVoGdBHTHHB72eh2NT:rv6L26AaNeWgPhlmVqkQ7XSKdDGjN
Malware Config
Extracted
quasar
1.4.1
Office04
answer-patients.gl.at.ply.gg:4538
bd9cc66c-344e-4ad2-b846-b59ac86aa18e
-
encryption_key
9672EF6F385B517A0E912363D30D7BF6BDEA77A6
-
install_name
siema.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
svhost.gg
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1628-1-0x00000000011C0000-0x00000000014E4000-memory.dmp family_quasar behavioral1/files/0x00080000000173b2-5.dat family_quasar behavioral1/memory/2644-7-0x00000000003B0000-0x00000000006D4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2644 siema.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\svhost.gg\siema.exe Client-built.exe File opened for modification C:\Windows\system32\svhost.gg\siema.exe Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 848 schtasks.exe 2480 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 Client-built.exe Token: SeDebugPrivilege 2644 siema.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 siema.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2644 siema.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 siema.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2480 1628 Client-built.exe 31 PID 1628 wrote to memory of 2480 1628 Client-built.exe 31 PID 1628 wrote to memory of 2480 1628 Client-built.exe 31 PID 1628 wrote to memory of 2644 1628 Client-built.exe 33 PID 1628 wrote to memory of 2644 1628 Client-built.exe 33 PID 1628 wrote to memory of 2644 1628 Client-built.exe 33 PID 2644 wrote to memory of 848 2644 siema.exe 34 PID 2644 wrote to memory of 848 2644 siema.exe 34 PID 2644 wrote to memory of 848 2644 siema.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\svhost.gg\siema.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2480
-
-
C:\Windows\system32\svhost.gg\siema.exe"C:\Windows\system32\svhost.gg\siema.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\svhost.gg\siema.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5c17ff0333852bb47c256d3a448910271
SHA1be09b580de7608f2f1e9013bd16ad5499faf2ce3
SHA256e5963a8de3d81aff5bd3193d5137baa1b9022d6106dc3141f4d99c14e2fbad7e
SHA5121bf1840de9a7547fef877e0986c4a71c0360ea9005a3f85b98836596acc713e6d9764fd9c0a0d7356b0621cb278ec403bf7ac71f8155decb046d14ec4ecd13f5