Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
177s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/12/2024, 17:07
Behavioral task
behavioral1
Sample
B.exe
Resource
win7-20240903-en
General
-
Target
B.exe
-
Size
348KB
-
MD5
a7062afc04eb9faba65626cc931c8a02
-
SHA1
6e9e65253cb693a786b43ae863c8294e09af189b
-
SHA256
04819d6129cf70696bb6c402127ea66208dbf2d6996ab9faca205b0ecfe33ca7
-
SHA512
17135b9f02f8cc5fe281c77ed618461cce97acf9aa6aa9741ed0e9bee61e01343830d86c498892855e7000c93d1997a8ebc3f62cbb655ba79e672344587b5b36
-
SSDEEP
6144:wmqQ4i1FFiEKkWAOrEdbJpjYYTLQn6LK2EM8O:Pplikm+UYPQn6LKnM8O
Malware Config
Extracted
quasar
1.3.0.0
Test
4.tcp.eu.ngrok.io:8080
4.tcp.eu.ngrok.io:16210
QSR_MUTEX_Nf297179RoX9PEGnGN
-
encryption_key
6GgXmwACZXvigXZxSjrr
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2324-1-0x0000000000F80000-0x0000000000FDE000-memory.dmp family_quasar behavioral1/files/0x0009000000017491-4.dat family_quasar behavioral1/memory/2844-9-0x0000000000FD0000-0x000000000102E000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2844 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 B.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 5 4.tcp.eu.ngrok.io 11 4.tcp.eu.ngrok.io 19 4.tcp.eu.ngrok.io 24 4.tcp.eu.ngrok.io -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2324 B.exe Token: SeDebugPrivilege 2844 Client.exe Token: 33 484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 484 AUDIODG.EXE Token: 33 484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 484 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2844 2324 B.exe 32 PID 2324 wrote to memory of 2844 2324 B.exe 32 PID 2324 wrote to memory of 2844 2324 B.exe 32 PID 2324 wrote to memory of 2844 2324 B.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\B.exe"C:\Users\Admin\AppData\Local\Temp\B.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2680
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5a7062afc04eb9faba65626cc931c8a02
SHA16e9e65253cb693a786b43ae863c8294e09af189b
SHA25604819d6129cf70696bb6c402127ea66208dbf2d6996ab9faca205b0ecfe33ca7
SHA51217135b9f02f8cc5fe281c77ed618461cce97acf9aa6aa9741ed0e9bee61e01343830d86c498892855e7000c93d1997a8ebc3f62cbb655ba79e672344587b5b36