Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
Bestellung - 021224 - 901003637.exe
Resource
win7-20240903-en
General
-
Target
Bestellung - 021224 - 901003637.exe
-
Size
3.7MB
-
MD5
15f259b30ec72a5217144834f7f5b564
-
SHA1
baed3fe7d059a497f856e263431ccd3872ef1ea1
-
SHA256
01de053d9560d419f0b6c35dbddb1175eb1fd7a21450989332024b812d39c4c2
-
SHA512
5e1148a9cf8008b7c38d067ec34e5c3bc7255341d114476532f8111ea2c3e654eb70b0a439aaaea22543576f09b9cec269f9b3414a6a24fc54b89c7c677c5f47
-
SSDEEP
98304:ZrAsTIZbqqBQjwske/pCT66UNYekeWY0CE9:ZcCSL0ke/pO5ekeWtCE9
Malware Config
Extracted
quasar
1.4.1
DAVID
hoffmann3.ydns.eu:5829
532aca2b-96ff-44aa-9213-031e975919ac
-
encryption_key
C5B555A83D127A9553D4FB1FCECB35CE8E91A447
-
install_name
outlooks.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Outlooks
-
subdirectory
WindowsUpdates
Signatures
-
Quasar family
-
Quasar payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2728-31-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2728-29-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2728-28-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2728-25-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2728-23-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid Process 2056 powershell.exe 1920 powershell.exe 1932 powershell.exe 2272 powershell.exe -
Executes dropped EXE 6 IoCs
Processes:
outlooks.exeoutlooks.exeoutlooks.exeoutlooks.exeoutlooks.exeoutlooks.exepid Process 2456 outlooks.exe 2308 outlooks.exe 956 outlooks.exe 2192 outlooks.exe 2164 outlooks.exe 2176 outlooks.exe -
Loads dropped DLL 1 IoCs
Processes:
Bestellung - 021224 - 901003637.exepid Process 2728 Bestellung - 021224 - 901003637.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bestellung - 021224 - 901003637.exedescription pid Process procid_target PID 2524 set thread context of 2728 2524 Bestellung - 021224 - 901003637.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exeBestellung - 021224 - 901003637.exeschtasks.exeschtasks.exeBestellung - 021224 - 901003637.exepowershell.exeschtasks.exeoutlooks.exepowershell.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bestellung - 021224 - 901003637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bestellung - 021224 - 901003637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language outlooks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 2716 schtasks.exe 2612 schtasks.exe 2104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exepowershell.exeoutlooks.exepowershell.exepid Process 2056 powershell.exe 1920 powershell.exe 2272 powershell.exe 2456 outlooks.exe 2456 outlooks.exe 2456 outlooks.exe 2456 outlooks.exe 1932 powershell.exe 2456 outlooks.exe 2456 outlooks.exe 2456 outlooks.exe 2456 outlooks.exe 2456 outlooks.exe 2456 outlooks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exepowershell.exeBestellung - 021224 - 901003637.exepowershell.exeoutlooks.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 2728 Bestellung - 021224 - 901003637.exe Token: SeDebugPrivilege 2272 powershell.exe Token: SeDebugPrivilege 2456 outlooks.exe Token: SeDebugPrivilege 1932 powershell.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
Bestellung - 021224 - 901003637.exeBestellung - 021224 - 901003637.exeoutlooks.exedescription pid Process procid_target PID 2524 wrote to memory of 2056 2524 Bestellung - 021224 - 901003637.exe 31 PID 2524 wrote to memory of 2056 2524 Bestellung - 021224 - 901003637.exe 31 PID 2524 wrote to memory of 2056 2524 Bestellung - 021224 - 901003637.exe 31 PID 2524 wrote to memory of 2056 2524 Bestellung - 021224 - 901003637.exe 31 PID 2524 wrote to memory of 1920 2524 Bestellung - 021224 - 901003637.exe 33 PID 2524 wrote to memory of 1920 2524 Bestellung - 021224 - 901003637.exe 33 PID 2524 wrote to memory of 1920 2524 Bestellung - 021224 - 901003637.exe 33 PID 2524 wrote to memory of 1920 2524 Bestellung - 021224 - 901003637.exe 33 PID 2524 wrote to memory of 2716 2524 Bestellung - 021224 - 901003637.exe 35 PID 2524 wrote to memory of 2716 2524 Bestellung - 021224 - 901003637.exe 35 PID 2524 wrote to memory of 2716 2524 Bestellung - 021224 - 901003637.exe 35 PID 2524 wrote to memory of 2716 2524 Bestellung - 021224 - 901003637.exe 35 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2524 wrote to memory of 2728 2524 Bestellung - 021224 - 901003637.exe 37 PID 2728 wrote to memory of 2612 2728 Bestellung - 021224 - 901003637.exe 38 PID 2728 wrote to memory of 2612 2728 Bestellung - 021224 - 901003637.exe 38 PID 2728 wrote to memory of 2612 2728 Bestellung - 021224 - 901003637.exe 38 PID 2728 wrote to memory of 2612 2728 Bestellung - 021224 - 901003637.exe 38 PID 2728 wrote to memory of 2456 2728 Bestellung - 021224 - 901003637.exe 40 PID 2728 wrote to memory of 2456 2728 Bestellung - 021224 - 901003637.exe 40 PID 2728 wrote to memory of 2456 2728 Bestellung - 021224 - 901003637.exe 40 PID 2728 wrote to memory of 2456 2728 Bestellung - 021224 - 901003637.exe 40 PID 2456 wrote to memory of 1932 2456 outlooks.exe 41 PID 2456 wrote to memory of 1932 2456 outlooks.exe 41 PID 2456 wrote to memory of 1932 2456 outlooks.exe 41 PID 2456 wrote to memory of 1932 2456 outlooks.exe 41 PID 2456 wrote to memory of 2272 2456 outlooks.exe 42 PID 2456 wrote to memory of 2272 2456 outlooks.exe 42 PID 2456 wrote to memory of 2272 2456 outlooks.exe 42 PID 2456 wrote to memory of 2272 2456 outlooks.exe 42 PID 2456 wrote to memory of 2104 2456 outlooks.exe 43 PID 2456 wrote to memory of 2104 2456 outlooks.exe 43 PID 2456 wrote to memory of 2104 2456 outlooks.exe 43 PID 2456 wrote to memory of 2104 2456 outlooks.exe 43 PID 2456 wrote to memory of 956 2456 outlooks.exe 47 PID 2456 wrote to memory of 956 2456 outlooks.exe 47 PID 2456 wrote to memory of 956 2456 outlooks.exe 47 PID 2456 wrote to memory of 956 2456 outlooks.exe 47 PID 2456 wrote to memory of 2308 2456 outlooks.exe 48 PID 2456 wrote to memory of 2308 2456 outlooks.exe 48 PID 2456 wrote to memory of 2308 2456 outlooks.exe 48 PID 2456 wrote to memory of 2308 2456 outlooks.exe 48 PID 2456 wrote to memory of 2164 2456 outlooks.exe 49 PID 2456 wrote to memory of 2164 2456 outlooks.exe 49 PID 2456 wrote to memory of 2164 2456 outlooks.exe 49 PID 2456 wrote to memory of 2164 2456 outlooks.exe 49 PID 2456 wrote to memory of 2192 2456 outlooks.exe 50 PID 2456 wrote to memory of 2192 2456 outlooks.exe 50 PID 2456 wrote to memory of 2192 2456 outlooks.exe 50 PID 2456 wrote to memory of 2192 2456 outlooks.exe 50 PID 2456 wrote to memory of 2176 2456 outlooks.exe 51 PID 2456 wrote to memory of 2176 2456 outlooks.exe 51 PID 2456 wrote to memory of 2176 2456 outlooks.exe 51 PID 2456 wrote to memory of 2176 2456 outlooks.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bestellung - 021224 - 901003637.exe"C:\Users\Admin\AppData\Local\Temp\Bestellung - 021224 - 901003637.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Bestellung - 021224 - 901003637.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eNuXmIwkixzW.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eNuXmIwkixzW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE743.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\Bestellung - 021224 - 901003637.exe"C:\Users\Admin\AppData\Local\Temp\Bestellung - 021224 - 901003637.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Outlooks" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2612
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eNuXmIwkixzW.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eNuXmIwkixzW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2942.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2104
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"4⤵
- Executes dropped EXE
PID:956
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"4⤵
- Executes dropped EXE
PID:2308
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"4⤵
- Executes dropped EXE
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"4⤵
- Executes dropped EXE
PID:2192
-
-
C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"C:\Users\Admin\AppData\Roaming\WindowsUpdates\outlooks.exe"4⤵
- Executes dropped EXE
PID:2176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d55278e4148e33252f4e1be995add34b
SHA1cad56df348e6bf31f6ce291372bed770375b0873
SHA256aaaf3653ca512566eedb653f596447c0c190038d924e6673d2f301e2c013f093
SHA5121aa727eec0d664f60dcd4742a5add10013671ce98c9bdafbb003200e0e4c6a619d82397093174b15c40a5e3cd45e952dc24a1457e0ba2d6573c3aa97caa2de5a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JADA0PJMSYBQ4URNNQWD.temp
Filesize7KB
MD56df8dbebe31abe0aae325f953e7cba70
SHA19aca1bfdbac117511874ce3a7798711c3b17705c
SHA256f7bac1fe3c95eb262a531f90233ec6510560c441992b5902df0cd76d55060325
SHA5126e97374adb0234be9205cf8b9ef809197b689bd37dd7328683811b28e03c46bb24b131067abfc6591156ff6ddbda00ea10f7ef95f15620370a9fd7cce3120d2a
-
Filesize
3.7MB
MD515f259b30ec72a5217144834f7f5b564
SHA1baed3fe7d059a497f856e263431ccd3872ef1ea1
SHA25601de053d9560d419f0b6c35dbddb1175eb1fd7a21450989332024b812d39c4c2
SHA5125e1148a9cf8008b7c38d067ec34e5c3bc7255341d114476532f8111ea2c3e654eb70b0a439aaaea22543576f09b9cec269f9b3414a6a24fc54b89c7c677c5f47