Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 09:18
Static task
static1
Behavioral task
behavioral1
Sample
Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe
Resource
win7-20241023-en
General
-
Target
Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe
-
Size
174KB
-
MD5
90b63162f613ec7e392c15dbcc844750
-
SHA1
64acb9112424b2937dd3724d4460d64b5b418dbd
-
SHA256
4c5ae8b60005526d81508706a1dfc6e491a3d51bc2b0dbe2d26d2b53a25cfe50
-
SHA512
7f3057d6496895317acfadc40c620438709087f1dd61fc88ae210cb27ea036192e591287c295457c10080a380319ff98aee790264d5864668fc7f7d248e1d70b
-
SSDEEP
3072:c7DOEKsy8Jg6IlXjK1p8rlHfbbxfwIphhup6gma8f5tUzpTnZO+hOeH:H8JfcjW8rlHjb9/pXu8nOnE+N
Malware Config
Extracted
quasar
1.4.1
onye
winera.ydns.eu:6298
4d79333b-1758-4ff2-8d36-e4612bbfd878
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
settings
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3692-1201-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 404 created 3380 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CustomAttributes.vbs Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 404 set thread context of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe Token: SeDebugPrivilege 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe Token: SeDebugPrivilege 3692 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3692 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 404 wrote to memory of 3692 404 Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe 84 PID 3692 wrote to memory of 2700 3692 InstallUtil.exe 87 PID 3692 wrote to memory of 2700 3692 InstallUtil.exe 87 PID 3692 wrote to memory of 2700 3692 InstallUtil.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "settings" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-