Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe
Resource
win7-20240903-en
General
-
Target
Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe
-
Size
894KB
-
MD5
39c057d5422f27e72679ab1fa0c6aa1b
-
SHA1
8f29d37e6622a11e6d0d46312a6b29de83453d7d
-
SHA256
9dee5f3211377a710f006088e99409270a3d2ca982ec26eac5473ea3bfa2ce8b
-
SHA512
516add8c7c1827692d57341904ecb3672f9c24bfeb65c1733847f7cd7253f415f0c8001c088edb38984982f98188d9245a425954599e074d6671d7f0c9c7bafe
-
SSDEEP
12288:rg8sz5/vszGcF03buni+oqt0y0eVohUH4/OU18WN2rQzVKMd:s8sdszGcF1iBqt50eVohUH1U1sM
Malware Config
Extracted
quasar
1.4.1
chi
amaskdh.ydns.eu:6298
e3a0d936-49ca-41bb-a676-d392f4ae50e8
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4440-1201-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3932 created 3508 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KeysOrderedInEachPartition.vbs Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3932 set thread context of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe Token: SeDebugPrivilege 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe Token: SeDebugPrivilege 4440 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 3932 wrote to memory of 4440 3932 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 96 PID 4440 wrote to memory of 2448 4440 InstallUtil.exe 97 PID 4440 wrote to memory of 2448 4440 InstallUtil.exe 97 PID 4440 wrote to memory of 2448 4440 InstallUtil.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2448
-
-