Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 14:10
Behavioral task
behavioral1
Sample
virus.exe
Resource
win10v2004-20241007-en
General
-
Target
virus.exe
-
Size
3.1MB
-
MD5
73b5cbd365dd4c4f8d79f90ad2f39a04
-
SHA1
c4b793be677c7d741483b50165424197582f62a5
-
SHA256
4bddfdcba09c9f9e59fda803daa9ec70f752eb0184845c998858fda6ae6db7fc
-
SHA512
41182462081f190f94c71fc1c1cf94e6737b39c05d21c1c5ceb933ec851cae8c756ee2823f6858b2a141e54913f86ad7a07a0d622d302331cd5f087a32759bdf
-
SSDEEP
49152:KvelL26AaNeWgPhlmVqvMQ7XSK2C5F1vSLo4dUGTHHB72eh2NT:KvOL26AaNeWgPhlmVqkQ7XSK2C5c
Malware Config
Extracted
quasar
1.4.1
roar
fojeweb571-59953.portmap.host:59953
be18500e-48e3-4692-8887-f0261df08045
-
encryption_key
B42CE86AEBA4D8818352F4D811EA7BBB472E229A
-
install_name
windows defender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
discord
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/5008-1-0x0000000000BC0000-0x0000000000EE4000-memory.dmp family_quasar behavioral1/files/0x0008000000023c6f-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 512 windows defender.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3744 schtasks.exe 1464 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5008 virus.exe Token: SeDebugPrivilege 512 windows defender.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 512 windows defender.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3744 5008 virus.exe 83 PID 5008 wrote to memory of 3744 5008 virus.exe 83 PID 5008 wrote to memory of 512 5008 virus.exe 85 PID 5008 wrote to memory of 512 5008 virus.exe 85 PID 512 wrote to memory of 1464 512 windows defender.exe 86 PID 512 wrote to memory of 1464 512 windows defender.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\virus.exe"C:\Users\Admin\AppData\Local\Temp\virus.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "discord" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows defender.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3744
-
-
C:\Users\Admin\AppData\Roaming\SubDir\windows defender.exe"C:\Users\Admin\AppData\Roaming\SubDir\windows defender.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "discord" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\windows defender.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD573b5cbd365dd4c4f8d79f90ad2f39a04
SHA1c4b793be677c7d741483b50165424197582f62a5
SHA2564bddfdcba09c9f9e59fda803daa9ec70f752eb0184845c998858fda6ae6db7fc
SHA51241182462081f190f94c71fc1c1cf94e6737b39c05d21c1c5ceb933ec851cae8c756ee2823f6858b2a141e54913f86ad7a07a0d622d302331cd5f087a32759bdf