Analysis
-
max time kernel
49s -
max time network
49s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01-12-2024 18:34
Static task
static1
General
-
Target
PORQUEPUTASYANOSIRVE.7z
-
Size
923KB
-
MD5
d757d40193d311216967491e36fc2ba4
-
SHA1
2dd90fa74c489da4f85bdf301053230b480a31fa
-
SHA256
8a31693ddf8924f144ba19a8802766188bd13f1ed7eea7c226eb0e01a9e47685
-
SHA512
9be26ab222457605eea0c42a4dbcfa80154cb384e6abf0db6a010fcca172a0eda8792b9e3fff9d67717f095f67448d9310c7e049f7fea8dd5907afe8bd462921
-
SSDEEP
24576:q9gl2kNvEE7GFdGqXsShFTAkBojKLUI56eGk:46vbIGqXscAkW+h1
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0028000000045061-3.dat family_quasar behavioral1/memory/2332-5-0x0000000000550000-0x0000000000874000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 2332 PORQUEPUTASYANOSIRVE.exe 1244 Client.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133775517365375759" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3188 schtasks.exe 1628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeRestorePrivilege 4704 7zFM.exe Token: 35 4704 7zFM.exe Token: SeSecurityPrivilege 4704 7zFM.exe Token: SeDebugPrivilege 2332 PORQUEPUTASYANOSIRVE.exe Token: SeDebugPrivilege 1244 Client.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe Token: SeShutdownPrivilege 3420 chrome.exe Token: SeCreatePagefilePrivilege 3420 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4704 7zFM.exe 4704 7zFM.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe 3420 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1244 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3188 2332 PORQUEPUTASYANOSIRVE.exe 90 PID 2332 wrote to memory of 3188 2332 PORQUEPUTASYANOSIRVE.exe 90 PID 2332 wrote to memory of 1244 2332 PORQUEPUTASYANOSIRVE.exe 92 PID 2332 wrote to memory of 1244 2332 PORQUEPUTASYANOSIRVE.exe 92 PID 1244 wrote to memory of 1628 1244 Client.exe 93 PID 1244 wrote to memory of 1628 1244 Client.exe 93 PID 3420 wrote to memory of 3104 3420 chrome.exe 99 PID 3420 wrote to memory of 3104 3420 chrome.exe 99 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 4756 3420 chrome.exe 100 PID 3420 wrote to memory of 1796 3420 chrome.exe 101 PID 3420 wrote to memory of 1796 3420 chrome.exe 101 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 PID 3420 wrote to memory of 4856 3420 chrome.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\PORQUEPUTASYANOSIRVE.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4704
-
C:\Users\Admin\Desktop\PORQUEPUTASYANOSIRVE.exe"C:\Users\Admin\Desktop\PORQUEPUTASYANOSIRVE.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3188
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1628
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff986f8cc40,0x7ff986f8cc4c,0x7ff986f8cc582⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2192,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4632,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4452,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4940,i,1212668739062400225,7028774060880726792,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5225c647b6b5b8fd753ccf62b813f14fc
SHA148b9e7a1bd9465ef8bb2ac4b044567d78c0a11ee
SHA2566e8a750dc3f628d9314b7cc111b1f9a89dd72c7fbd721d674363cb5d76735e8c
SHA512e12136afcbad6fbae3eb90350b86279576734e836c3aa48234e23d9fe155bd978ec973c22495e0884f3311fed9ceacb42e52042781503d4293ab256e1c2ec856
-
Filesize
2KB
MD5f8f3e6dbdecfa1d5832cf56c0c6749d9
SHA1257ce9b3a4b18950afc6644b9f11bbce8effe8f0
SHA256a7a5c9d8c9cf1cb4d1088de84fc15eaab18784e5d174c16e2eac60a663f32e1f
SHA5123b00bdabf86fee6bcb113eadeb855da222db330fb477d8d43d101670731aeece6a2fe9b7e48ca9b8662fe6d98fe87825930837e83c561b2bb8e887b0633c3b06
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5085f830d3df9528887a0db4d62afcee1
SHA1a43eae2e63484d5d31d41953b2ee71b69aaa32cd
SHA2562903c9d2488c58e7de4987c52d2f775986790f9fdae3817681e16d2b5807d75d
SHA512111d9cd8f9539c7c59167b39e38789b3d7452e85433a30153837f57c35296adc0cfa8cc84ba7b013b6fa8b673622af24a09aed285df68dad0eee7ab276dc54fa
-
Filesize
9KB
MD56e91a31ebae9db082eecfc92f0060829
SHA15ba5aac9baf92392dfe7cafbaec190e6a8e48d99
SHA256f56e3b1132d5e504eebb6cb3f2531219cb84f889813f91e762d918914e6ff1f8
SHA512f208fde5f38f06999759ac0f42eddcc397dc31fb43defe0cd8ac8fc9830005a95a9c275e159afb7bef6c8bdb11f5d64f1841b5463190aaba38ea933c7e9a47d5
-
Filesize
236KB
MD523b72350354b515594d6bf4331d6ecce
SHA1e721db0dfa40af8eeb42ad0b0c98fd8c5d47f7e2
SHA256b75fb923156b56ca64c9ee90856029c81267b0a5032244db4671f3f712625fba
SHA5122e787f1e4df06c0b9f9d68e80fcebcf8336163556a57a100e4b46f12d95109e7ba4f5b56d6f0f65ab0f6f681397332e553fd41852b6eb924573b1ec1a09641d5
-
Filesize
3.1MB
MD573565f33ed4d8741291cbb30409f1727
SHA14d3a54b28f3ea80f884a25905e27165bdc353109
SHA256aafe953e627f9e733e101d7211f0c9594dbdf82ec4019b2c9aa361cbc478f0de
SHA512d897b098ddcdc94ac9177bc9a90b700c8b9a7cfafa74f729beebf74a094f76a7bd69e764711bdfedcdd231465daef16e937676e391ca2c010df03fecc863b583