Analysis
-
max time kernel
52s -
max time network
52s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30-11-2024 18:18
Static task
static1
General
-
Target
PORQUEPUTASYANOSIRVE.7z
-
Size
923KB
-
MD5
d757d40193d311216967491e36fc2ba4
-
SHA1
2dd90fa74c489da4f85bdf301053230b480a31fa
-
SHA256
8a31693ddf8924f144ba19a8802766188bd13f1ed7eea7c226eb0e01a9e47685
-
SHA512
9be26ab222457605eea0c42a4dbcfa80154cb384e6abf0db6a010fcca172a0eda8792b9e3fff9d67717f095f67448d9310c7e049f7fea8dd5907afe8bd462921
-
SSDEEP
24576:q9gl2kNvEE7GFdGqXsShFTAkBojKLUI56eGk:46vbIGqXscAkW+h1
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0028000000045060-2.dat family_quasar behavioral1/memory/1888-5-0x0000000000340000-0x0000000000664000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 1888 PORQUEPUTASYANOSIRVE.exe 3364 Client.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133774643826347243" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2920 schtasks.exe 2340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3504 chrome.exe 3504 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1600 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeRestorePrivilege 1600 7zFM.exe Token: 35 1600 7zFM.exe Token: SeSecurityPrivilege 1600 7zFM.exe Token: SeRestorePrivilege 2076 7zG.exe Token: 35 2076 7zG.exe Token: SeSecurityPrivilege 1600 7zFM.exe Token: SeDebugPrivilege 1888 PORQUEPUTASYANOSIRVE.exe Token: SeDebugPrivilege 3364 Client.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe Token: SeShutdownPrivilege 3504 chrome.exe Token: SeCreatePagefilePrivilege 3504 chrome.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1600 7zFM.exe 1600 7zFM.exe 1600 7zFM.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe 3504 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3364 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2076 1600 7zFM.exe 84 PID 1600 wrote to memory of 2076 1600 7zFM.exe 84 PID 1888 wrote to memory of 2920 1888 PORQUEPUTASYANOSIRVE.exe 92 PID 1888 wrote to memory of 2920 1888 PORQUEPUTASYANOSIRVE.exe 92 PID 1888 wrote to memory of 3364 1888 PORQUEPUTASYANOSIRVE.exe 94 PID 1888 wrote to memory of 3364 1888 PORQUEPUTASYANOSIRVE.exe 94 PID 3364 wrote to memory of 2340 3364 Client.exe 95 PID 3364 wrote to memory of 2340 3364 Client.exe 95 PID 3504 wrote to memory of 2928 3504 chrome.exe 99 PID 3504 wrote to memory of 2928 3504 chrome.exe 99 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 3608 3504 chrome.exe 100 PID 3504 wrote to memory of 4724 3504 chrome.exe 101 PID 3504 wrote to memory of 4724 3504 chrome.exe 101 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 PID 3504 wrote to memory of 1088 3504 chrome.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\PORQUEPUTASYANOSIRVE.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap10746:144:7zEvent14648 -ad -saa -- "C:\Archive"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Users\Admin\Desktop\PORQUEPUTASYANOSIRVE.exe"C:\Users\Admin\Desktop\PORQUEPUTASYANOSIRVE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2920
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2340
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffa2fa3cc40,0x7ffa2fa3cc4c,0x7ffa2fa3cc582⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1560,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4716,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,7236973094711786634,16605495865318516081,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD515032847f879ff99b7b264e71c02a9c8
SHA18c9ccf0846c8fedb8e6770fede1e85033fd203dc
SHA2569d737c35cfbb9f2f75ac9cc0f84d1987e0f570ca6d0d4f7d80b9409334376291
SHA512dbbbc4f913c81f0f6af7112e7e5cd8c71e95c54978abdc187bff8a70e14b5fe8b2a3c44675ba29e164600f283677899fa35a3e6ed8f46d72ca91baf0ebab5c28
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
120KB
MD5473f59ec3513c443c1adc3e38da524d9
SHA1ebd7764022c41aa54ec20ca6799ca18f786e0599
SHA2569ed78ee299fce6f8f6c1de1168b14d830d0af8bde3d8cf2895391cd321ea7184
SHA512797264f97f19ad09adf8e6dec66ecdef47722b05b146e3fe2c5efe096112a11dd59ebe0c78fe167cc5e63d3430ab7a30f6a4a8a49bfb617bbf1e29987f9816e0
-
Filesize
3.1MB
MD573565f33ed4d8741291cbb30409f1727
SHA14d3a54b28f3ea80f884a25905e27165bdc353109
SHA256aafe953e627f9e733e101d7211f0c9594dbdf82ec4019b2c9aa361cbc478f0de
SHA512d897b098ddcdc94ac9177bc9a90b700c8b9a7cfafa74f729beebf74a094f76a7bd69e764711bdfedcdd231465daef16e937676e391ca2c010df03fecc863b583