Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/12/2024, 04:37
Behavioral task
behavioral1
Sample
4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe
Resource
win7-20240903-en
General
-
Target
4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe
-
Size
3.1MB
-
MD5
69b4286cd2963d3c89f35fdec630576c
-
SHA1
ea2a6274c2b8b866e91b72c3baa8f3162db92388
-
SHA256
4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675
-
SHA512
2e6b0952e08af312a56b355fd1f24384162c54dd0e9c091d476311642c6321184f586695955a879be9e118b9ace3ce77e629fac94b480c37b2da26845c059841
-
SSDEEP
49152:av/lL26AaNeWgPhlmVqvMQ7XSKPHgMtDw48coGdMTHHB72eh2NT6:avNL26AaNeWgPhlmVqkQ7XSKPAMJY
Malware Config
Extracted
quasar
1.4.1
database
91.160.181.237:4782
91.160.181.237:4783
bcda0faa-47b1-4e7d-be7c-8ff6fbc69a61
-
encryption_key
65940F11374651C87E8131C4328E542AEFE6F05D
-
install_name
Runtlme Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtlme Broker
-
subdirectory
Runtlme Broker
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/576-1-0x0000000000F90000-0x00000000012B4000-memory.dmp family_quasar behavioral1/files/0x0008000000019461-5.dat family_quasar behavioral1/memory/3024-9-0x00000000010B0000-0x00000000013D4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3024 Runtlme Broker.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\Runtlme Broker\Runtlme Broker.exe 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe File opened for modification C:\Windows\system32\Runtlme Broker\Runtlme Broker.exe 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe File opened for modification C:\Windows\system32\Runtlme Broker 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe File opened for modification C:\Windows\system32\Runtlme Broker\Runtlme Broker.exe Runtlme Broker.exe File opened for modification C:\Windows\system32\Runtlme Broker Runtlme Broker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2016 schtasks.exe 2132 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 576 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe Token: SeDebugPrivilege 3024 Runtlme Broker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 Runtlme Broker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 576 wrote to memory of 2016 576 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe 31 PID 576 wrote to memory of 2016 576 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe 31 PID 576 wrote to memory of 2016 576 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe 31 PID 576 wrote to memory of 3024 576 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe 33 PID 576 wrote to memory of 3024 576 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe 33 PID 576 wrote to memory of 3024 576 4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe 33 PID 3024 wrote to memory of 2132 3024 Runtlme Broker.exe 34 PID 3024 wrote to memory of 2132 3024 Runtlme Broker.exe 34 PID 3024 wrote to memory of 2132 3024 Runtlme Broker.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe"C:\Users\Admin\AppData\Local\Temp\4aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Runtlme Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtlme Broker\Runtlme Broker.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
C:\Windows\system32\Runtlme Broker\Runtlme Broker.exe"C:\Windows\system32\Runtlme Broker\Runtlme Broker.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Runtlme Broker" /sc ONLOGON /tr "C:\Windows\system32\Runtlme Broker\Runtlme Broker.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD569b4286cd2963d3c89f35fdec630576c
SHA1ea2a6274c2b8b866e91b72c3baa8f3162db92388
SHA2564aa3e2e4f7c2d657bcbebe307a15ab4dee819e3d70fec4e92b78fd483690e675
SHA5122e6b0952e08af312a56b355fd1f24384162c54dd0e9c091d476311642c6321184f586695955a879be9e118b9ace3ce77e629fac94b480c37b2da26845c059841