Analysis
-
max time kernel
77s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 16:01
Behavioral task
behavioral1
Sample
Nemoxen.exe
Resource
win7-20241010-en
General
-
Target
Nemoxen.exe
-
Size
676KB
-
MD5
716e0b20fd82fb68e9f12545d40f1885
-
SHA1
0126cb0ee18f2b7500dd92960f88292be25810b1
-
SHA256
ee060b6a8e139aa8169c8d738b1edde88550f61d69a89168648f8a359d937840
-
SHA512
8f1c0c245979c5f27191607dc778cc6e4b6a10d41f42ec621891d345cef3eb1353b46c45496fdf9c89026dcf9671d3b5240730e80c25270dfdabf886a91105c4
-
SSDEEP
6144:jTEgdc0YWX7IxUpGREWxtTNHuagRsqbRscEWOb8F9mo0aID/kIucTR3PF+fE:jTEgdfY3xUc1osmpgoyDMIucdd+8
Malware Config
Extracted
quasar
1.4.0
Neoxen
192.168.0.42:4782
5e5c2635-6e73-4945-84d1-6fff2a604503
-
encryption_key
4D634613C08A5953B861CE48D768ABEFCD1484A3
-
install_name
coolpro12.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Neoxen
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1748-1-0x00000000008B0000-0x0000000000960000-memory.dmp family_quasar behavioral1/files/0x0009000000016d46-5.dat family_quasar behavioral1/memory/1692-8-0x0000000000A90000-0x0000000000B40000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1692 coolpro12.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1876 schtasks.exe 2788 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1748 Nemoxen.exe Token: SeDebugPrivilege 1692 coolpro12.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 coolpro12.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1692 coolpro12.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1876 1748 Nemoxen.exe 30 PID 1748 wrote to memory of 1876 1748 Nemoxen.exe 30 PID 1748 wrote to memory of 1876 1748 Nemoxen.exe 30 PID 1748 wrote to memory of 1692 1748 Nemoxen.exe 32 PID 1748 wrote to memory of 1692 1748 Nemoxen.exe 32 PID 1748 wrote to memory of 1692 1748 Nemoxen.exe 32 PID 1692 wrote to memory of 2788 1692 coolpro12.exe 33 PID 1692 wrote to memory of 2788 1692 coolpro12.exe 33 PID 1692 wrote to memory of 2788 1692 coolpro12.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nemoxen.exe"C:\Users\Admin\AppData\Local\Temp\Nemoxen.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Nemoxen.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1876
-
-
C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Neoxen" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\coolpro12.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5716e0b20fd82fb68e9f12545d40f1885
SHA10126cb0ee18f2b7500dd92960f88292be25810b1
SHA256ee060b6a8e139aa8169c8d738b1edde88550f61d69a89168648f8a359d937840
SHA5128f1c0c245979c5f27191607dc778cc6e4b6a10d41f42ec621891d345cef3eb1353b46c45496fdf9c89026dcf9671d3b5240730e80c25270dfdabf886a91105c4