Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    02-12-2024 04:12

General

  • Target

    Top4smm Dinero Ilimitado.zip

  • Size

    1.1MB

  • MD5

    bfa47aae21e145867fa2536f3adb0fbb

  • SHA1

    b7b6eaccdf32b323421b75ad8e4e420a4527b151

  • SHA256

    a9fc07683b0c89a1a3cfba37fd4548e6b28ebf334dca8cf79d4edada41ece724

  • SHA512

    8ca4870f1949aaf6476b3ed18bfa5764110184242d0ae2d631b28b618cb167ec4de3267776be67a6bfd1de66e5f777fc75d25a8de2c75ef16578637f514906ae

  • SSDEEP

    24576:+NEcxEieY4MkUNZfAzaSbhDmRsYyAo1GMvTSplXql0pDAkddsid2g4:6Ecx5UUnfW9qRU4E2lXSH0sidD4

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

azxq0ap.localto.net:3425

Mutex

e51e2b65-e963-4051-9736-67d57ed46798

Attributes
  • encryption_key

    AEA258EF65BF1786F0F767C0BE2497ECC304C46F

  • install_name

    WindowsUpdate.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    WindowsUpdate

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Top4smm Dinero Ilimitado.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2052
  • C:\Users\Admin\Desktop\Top4smm Dinero Ilimitado.exe
    "C:\Users\Admin\Desktop\Top4smm Dinero Ilimitado.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3008
    • C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3176
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffa95afcc40,0x7ffa95afcc4c,0x7ffa95afcc58
      2⤵
        PID:4588
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1860 /prefetch:2
        2⤵
          PID:3736
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2192,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2252 /prefetch:3
          2⤵
            PID:2304
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2452 /prefetch:8
            2⤵
              PID:4656
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3140 /prefetch:1
              2⤵
                PID:4776
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3288 /prefetch:1
                2⤵
                  PID:3088
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4488 /prefetch:1
                  2⤵
                    PID:3056
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4948 /prefetch:8
                    2⤵
                      PID:4888
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,5208091676541517291,5626918541486136988,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4964 /prefetch:8
                      2⤵
                        PID:4624
                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                      1⤵
                        PID:4744
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                        1⤵
                          PID:2664

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                          Filesize

                          649B

                          MD5

                          4b28cf448b8cbe34f19e4b45e8bdb4dc

                          SHA1

                          38ab02fdfc6bbbdac7bc005adc66d0ad506fb3c3

                          SHA256

                          071126086ceef0f5f7eff49be361e13a75bae9bcda1bd8d808131d3ace67870b

                          SHA512

                          d7abdc6a9cf3f1731e8241f8a3b62382b45d27ce52f6070929135a5fc4ff371ea4497d2f86d11cde162b388b9d9b22b3c38e3315d76f4e26496a3702bc9a796a

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                          Filesize

                          356B

                          MD5

                          a7f33d90f97f4890330335221878c035

                          SHA1

                          ea71c807dbb34045b83b62276ec6cc7dfc2245dc

                          SHA256

                          79ae21be9fa44c07e4464068616e7b604e23ed6d2e89b87d7e2ad9444c379243

                          SHA512

                          fcad53c9728f3ad32754035d588d89c83a2d43654cb5d6e6760b181c411192eb8b51dfb83dadf1ecbfa8990873803a8e9ad99866ed8d3930daa8010195ab4bcf

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          17f0196b4253a905a181008ebfcd3391

                          SHA1

                          a85636c4af0fe56cd4e26bbba6bb3e1df8d7072e

                          SHA256

                          8c1e29a3edbed630a8d32c97235c35346c09c07d2439ae04133651965c81d5ee

                          SHA512

                          150bd91dab2483c44fd023866bca4d113c9e5b89b0851e946fcc0ca13123e5d1b9677cf092cff620ff38d74ce03740a163627799872d59d9cfe3e7a0d40ce8bc

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          80f870e23b8ff830ad64395939e0b428

                          SHA1

                          a947951f4ae043206f63d3e9e6d068df52008472

                          SHA256

                          bb34951e145641fea2850de4f2c7c19490005f7a3d3152845b28cefbc7116d02

                          SHA512

                          23e473dc2d1daef2b5472c62f5e10d109aa42ef4c283d09479bf3ca83fad8fafa92089b65dca47fe12ac9d82bb2b7b091db9ec41e38e7620405c2a44bc565e3d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          9KB

                          MD5

                          3d042fd5a762d577c6ffd5763928b897

                          SHA1

                          92711796fc86904fe70764e80ffbe3f17c675b93

                          SHA256

                          0ece45e12c07ba7e44f697b92ee630f6935fc1c884063f21d0b3d0f3583676f4

                          SHA512

                          eeaebfd3a8f581d1a54d59c920d1dfa9dad2e15ac0ce86c32d3365d5d1f827444b6435c8d064ff269f51a504fc0d9f37abfa82584fce33ad45d2a2f249eb90c5

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                          Filesize

                          15KB

                          MD5

                          9a8ec68641f20c5b6cbe2e1c30614b79

                          SHA1

                          cd4def48462ac21569a40f246ee62f09a8df19a5

                          SHA256

                          79041d952aa9d4ced06152ea6435f082b167a0963d59f92380c883e823d6482c

                          SHA512

                          e71a2d38ec65f01b1a8ee749fd410865e3dc069b229a2e946c29a0e90dc7eb038d4869c7127d60926282aa8b9bf169412b12ecfe9d94cdc8dbe741c20dc90f76

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          236KB

                          MD5

                          d72ccc51ac5ef5cce1dd5ef982f08d9c

                          SHA1

                          f38158905e1a7013ead48fe639754fa72dcca68b

                          SHA256

                          1b1f773d2fefd6a8cb58ef552a12bb9e04442f5f10d91a2eb394c8e3c98f1cc7

                          SHA512

                          0cbf88429dec75328b121cd0b08994013c68e4f5f0f921302b6cf68c9e7bdee325832820e5ab2950d2b2276ca6333ad58a14a958eedbf936f0b69f75b717f08c

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          236KB

                          MD5

                          980731055e031d12bc515126e8910acc

                          SHA1

                          be2dbf1abe2917e68ec1bd2cea65d0051a09dd1f

                          SHA256

                          37b52da69bf03e6276d3849cd3431aca27bcb653e2a4fa6e9c593bf5330c45a0

                          SHA512

                          f2ee5b2ad3c54e16a64e5e0ac4cefe32f5a670281053ff7720da0827b41747278084d5ebef63b14022a2a0abd024e4a08b248628523b92968cf77a994d5cf529

                        • C:\Users\Admin\Desktop\Top4smm Dinero Ilimitado.exe

                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                        • C:\Users\Admin\Desktop\Top4smm Dinero Ilimitado.exe

                          Filesize

                          3.2MB

                          MD5

                          74474ce327c2d8e2b74eba981a7e3249

                          SHA1

                          48544696b4ce7c96559a791efb58ec7481092454

                          SHA256

                          46ca3722c1851d6a68aea45c19e64a4c735eb236403e172422d02bbff4e35cca

                          SHA512

                          0c5b75305b19e0dcaacb9f3df556cdb136c002a5732625cb096fdd0a69e4a6a4b96507bb2948b847e2726d98e424462a237e0c0cecb1210c45cef52c7c1accc1

                        • memory/3028-16-0x000000001C510000-0x000000001C522000-memory.dmp

                          Filesize

                          72KB

                        • memory/3028-17-0x000000001D190000-0x000000001D1CC000-memory.dmp

                          Filesize

                          240KB

                        • memory/3028-13-0x000000001C590000-0x000000001C642000-memory.dmp

                          Filesize

                          712KB

                        • memory/3028-12-0x000000001B460000-0x000000001B4B0000-memory.dmp

                          Filesize

                          320KB

                        • memory/4620-11-0x00007FFA853C0000-0x00007FFA85E82000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4620-8-0x00007FFA853C0000-0x00007FFA85E82000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/4620-7-0x0000000000520000-0x0000000000852000-memory.dmp

                          Filesize

                          3.2MB

                        • memory/4620-6-0x00007FFA853C3000-0x00007FFA853C5000-memory.dmp

                          Filesize

                          8KB