Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-9765456-export23....exe
Resource
win7-20240903-en
General
-
Target
Purchase Order-9765456-export23....exe
-
Size
174KB
-
MD5
90b63162f613ec7e392c15dbcc844750
-
SHA1
64acb9112424b2937dd3724d4460d64b5b418dbd
-
SHA256
4c5ae8b60005526d81508706a1dfc6e491a3d51bc2b0dbe2d26d2b53a25cfe50
-
SHA512
7f3057d6496895317acfadc40c620438709087f1dd61fc88ae210cb27ea036192e591287c295457c10080a380319ff98aee790264d5864668fc7f7d248e1d70b
-
SSDEEP
3072:c7DOEKsy8Jg6IlXjK1p8rlHfbbxfwIphhup6gma8f5tUzpTnZO+hOeH:H8JfcjW8rlHjb9/pXu8nOnE+N
Malware Config
Extracted
quasar
1.4.1
onye
winera.ydns.eu:6298
4d79333b-1758-4ff2-8d36-e4612bbfd878
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
settings
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4136-1201-0x0000000000B00000-0x0000000000E24000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2928 created 3536 2928 Purchase Order-9765456-export23....exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CustomAttributes.vbs Purchase Order-9765456-export23....exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2928 set thread context of 4136 2928 Purchase Order-9765456-export23....exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order-9765456-export23....exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2928 Purchase Order-9765456-export23....exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2928 Purchase Order-9765456-export23....exe Token: SeDebugPrivilege 2928 Purchase Order-9765456-export23....exe Token: SeDebugPrivilege 4136 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4136 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 2928 wrote to memory of 4136 2928 Purchase Order-9765456-export23....exe 83 PID 4136 wrote to memory of 4556 4136 InstallUtil.exe 88 PID 4136 wrote to memory of 4556 4136 InstallUtil.exe 88 PID 4136 wrote to memory of 4556 4136 InstallUtil.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order-9765456-export23....exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order-9765456-export23....exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "settings" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4556
-
-