Analysis
-
max time kernel
92s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
TransferenciaInterbancaria.xlsx.exe
Resource
win7-20241010-en
General
-
Target
TransferenciaInterbancaria.xlsx.exe
-
Size
875KB
-
MD5
45ceeacf3abe7ed79b516d9f8a2a38da
-
SHA1
9dde49444c02e49ef15a885214a16dae2727ef1e
-
SHA256
b63d3105f4cc32fd098e2e780226965dac57cfb59be41705d14c4999413b39dd
-
SHA512
8c3128828df7d0ed0594f4273a2d8d66e66f43d4fe68fbef3ebc1e711324de7a7ce0db0c5c21fa1c8390a5ebb1d53ce9ff3f60bb57af31d7048c236a30d1b978
-
SSDEEP
12288:rDFW+bJWI5jPjdTYoeT2NecNhoU1JWE2rFoMuMK:FW+bJWIvLNemaU1/M
Malware Config
Extracted
quasar
1.4.1
mx
ert43w221.ydns.eu:6298
7a41955f-eb2f-4ca4-8f9f-5e9bfadf0810
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3040-1199-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4528 created 3556 4528 TransferenciaInterbancaria.xlsx.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WrappedObject.vbs TransferenciaInterbancaria.xlsx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4528 set thread context of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TransferenciaInterbancaria.xlsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4528 TransferenciaInterbancaria.xlsx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4528 TransferenciaInterbancaria.xlsx.exe Token: SeDebugPrivilege 4528 TransferenciaInterbancaria.xlsx.exe Token: SeDebugPrivilege 3040 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 4528 wrote to memory of 3040 4528 TransferenciaInterbancaria.xlsx.exe 85 PID 3040 wrote to memory of 4624 3040 InstallUtil.exe 89 PID 3040 wrote to memory of 4624 3040 InstallUtil.exe 89 PID 3040 wrote to memory of 4624 3040 InstallUtil.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\TransferenciaInterbancaria.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\TransferenciaInterbancaria.xlsx.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4624
-
-