Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 02:15
Behavioral task
behavioral1
Sample
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe
Resource
win10v2004-20241007-en
General
-
Target
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe
-
Size
3.1MB
-
MD5
93b0fa3d2291d7d09ceed2411f99596b
-
SHA1
1551e1ccc18576463e0b8c72aa6df57dd0dc935e
-
SHA256
16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730
-
SHA512
c530a129d4684c77bf42c6d1d9dffa428297f9279e273ecb3b358b24b618ca5a64d269225260930c740a37046ccd330e385fbab71f78c364d7ea0641f853722b
-
SSDEEP
49152:6vxI22SsaNYfdPBldt698dBcjHW7HkmztEoGdyNdTHHB72eh2NT:6vi22SsaNYfdPBldt6+dBcjHW7HQi
Malware Config
Extracted
quasar
1.4.1
RuntimeBroker
Cmaster-57540.portmap.io:57540
2b1bd80e-8434-44d0-8591-7df9c98096ff
-
encryption_key
25413ECFFC7EFB26F72ADF36F586C28A365109DC
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
1500
-
startup_key
RuntimeBroker
-
subdirectory
winrn
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2508-1-0x00000000008F0000-0x0000000000C14000-memory.dmp family_quasar behavioral1/files/0x0007000000018741-7.dat family_quasar behavioral1/memory/2016-8-0x00000000011F0000-0x0000000001514000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2016 RuntimeBroker.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\winrn 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe File opened for modification C:\Windows\system32\winrn\RuntimeBroker.exe RuntimeBroker.exe File opened for modification C:\Windows\system32\winrn RuntimeBroker.exe File created C:\Windows\system32\winrn\RuntimeBroker.exe 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe File opened for modification C:\Windows\system32\winrn\RuntimeBroker.exe 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2772 schtasks.exe 2636 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2508 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe Token: SeDebugPrivilege 2016 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2772 2508 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 31 PID 2508 wrote to memory of 2772 2508 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 31 PID 2508 wrote to memory of 2772 2508 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 31 PID 2508 wrote to memory of 2016 2508 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 33 PID 2508 wrote to memory of 2016 2508 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 33 PID 2508 wrote to memory of 2016 2508 16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe 33 PID 2016 wrote to memory of 2636 2016 RuntimeBroker.exe 34 PID 2016 wrote to memory of 2636 2016 RuntimeBroker.exe 34 PID 2016 wrote to memory of 2636 2016 RuntimeBroker.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe"C:\Users\Admin\AppData\Local\Temp\16898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\winrn\RuntimeBroker.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2772
-
-
C:\Windows\system32\winrn\RuntimeBroker.exe"C:\Windows\system32\winrn\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\winrn\RuntimeBroker.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD593b0fa3d2291d7d09ceed2411f99596b
SHA11551e1ccc18576463e0b8c72aa6df57dd0dc935e
SHA25616898c06cd100b7132bb2cde538cd45ae691cd87045f2ef05727261cb4328730
SHA512c530a129d4684c77bf42c6d1d9dffa428297f9279e273ecb3b358b24b618ca5a64d269225260930c740a37046ccd330e385fbab71f78c364d7ea0641f853722b