Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 12:24
Behavioral task
behavioral1
Sample
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe
Resource
win10v2004-20241007-en
General
-
Target
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe
-
Size
3.1MB
-
MD5
93b0fa3d2291d7d09ceed2411f99596b
-
SHA1
1551e1ccc18576463e0b8c72aa6df57dd0dc935e
-
SHA256
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730
-
SHA512
c530a129d4684c77bf42c6d1d9dffa428297f9279e273ecb3b358b24b618ca5a64d269225260930c740a37046ccd330e385fbab71f78c364d7ea0641f853722b
-
SSDEEP
49152:6vxI22SsaNYfdPBldt698dBcjHW7HkmztEoGdyNdTHHB72eh2NT:6vi22SsaNYfdPBldt6+dBcjHW7HQi
Malware Config
Extracted
quasar
1.4.1
RuntimeBroker
Cmaster-57540.portmap.io:57540
2b1bd80e-8434-44d0-8591-7df9c98096ff
-
encryption_key
25413ECFFC7EFB26F72ADF36F586C28A365109DC
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
1500
-
startup_key
RuntimeBroker
-
subdirectory
winrn
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1504-1-0x00000000008C0000-0x0000000000BE4000-memory.dmp family_quasar behavioral1/files/0x0009000000016c5c-6.dat family_quasar behavioral1/memory/1564-9-0x00000000000B0000-0x00000000003D4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1564 RuntimeBroker.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\winrn\RuntimeBroker.exe 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe File opened for modification C:\Windows\system32\winrn\RuntimeBroker.exe 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe File opened for modification C:\Windows\system32\winrn 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe File opened for modification C:\Windows\system32\winrn\RuntimeBroker.exe RuntimeBroker.exe File opened for modification C:\Windows\system32\winrn RuntimeBroker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2164 schtasks.exe 2388 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1504 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe Token: SeDebugPrivilege 1564 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1564 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2164 1504 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 30 PID 1504 wrote to memory of 2164 1504 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 30 PID 1504 wrote to memory of 2164 1504 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 30 PID 1504 wrote to memory of 1564 1504 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 32 PID 1504 wrote to memory of 1564 1504 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 32 PID 1504 wrote to memory of 1564 1504 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 32 PID 1564 wrote to memory of 2388 1564 RuntimeBroker.exe 33 PID 1564 wrote to memory of 2388 1564 RuntimeBroker.exe 33 PID 1564 wrote to memory of 2388 1564 RuntimeBroker.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe"C:\Users\Admin\AppData\Local\Temp\16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\winrn\RuntimeBroker.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
C:\Windows\system32\winrn\RuntimeBroker.exe"C:\Windows\system32\winrn\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\winrn\RuntimeBroker.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD593b0fa3d2291d7d09ceed2411f99596b
SHA11551e1ccc18576463e0b8c72aa6df57dd0dc935e
SHA25616898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730
SHA512c530a129d4684c77bf42c6d1d9dffa428297f9279e273ecb3b358b24b618ca5a64d269225260930c740a37046ccd330e385fbab71f78c364d7ea0641f853722b