Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe
Resource
win7-20240903-en
General
-
Target
Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe
-
Size
894KB
-
MD5
39c057d5422f27e72679ab1fa0c6aa1b
-
SHA1
8f29d37e6622a11e6d0d46312a6b29de83453d7d
-
SHA256
9dee5f3211377a710f006088e99409270a3d2ca982ec26eac5473ea3bfa2ce8b
-
SHA512
516add8c7c1827692d57341904ecb3672f9c24bfeb65c1733847f7cd7253f415f0c8001c088edb38984982f98188d9245a425954599e074d6671d7f0c9c7bafe
-
SSDEEP
12288:rg8sz5/vszGcF03buni+oqt0y0eVohUH4/OU18WN2rQzVKMd:s8sdszGcF1iBqt50eVohUH1U1sM
Malware Config
Extracted
quasar
1.4.1
chi
amaskdh.ydns.eu:6298
e3a0d936-49ca-41bb-a676-d392f4ae50e8
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4428-1203-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3696 created 3488 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KeysOrderedInEachPartition.vbs Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3696 set thread context of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe Token: SeDebugPrivilege 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe Token: SeDebugPrivilege 4428 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 3696 wrote to memory of 4428 3696 Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe 91 PID 4428 wrote to memory of 4404 4428 InstallUtil.exe 92 PID 4428 wrote to memory of 4404 4428 InstallUtil.exe 92 PID 4428 wrote to memory of 4404 4428 InstallUtil.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Kindswater AG - TG4554476- MEXICO-2024-300994.xlsx.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4404
-
-