Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe
Resource
win7-20240903-en
General
-
Target
2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe
-
Size
1.2MB
-
MD5
ba37fbfa3aeaeb232642fb5752862330
-
SHA1
40f6e7246792025c8954d9a45c43a04e7c3b2fd5
-
SHA256
2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1b
-
SHA512
8f8f0e396218a538e03ed430cffaaf8cb4951f979ccef35961123eddfef282e018bc02c50bccede92b1ee3a9e14615ba1af495d600a471452de03ee70674046a
-
SSDEEP
24576:srORE29TTVx8aBRd1h1orq+GWE0Jc5bDTj1Vyv9TvaFjUSbRUu5+Jitsa+AxSp:s2EYTb8atv1orq+pEiSDTj1VyvBaFRbY
Malware Config
Extracted
quasar
1.3.0.0
CPU
ejss.duckdns.org:2020
QSR_MUTEX_sgY7Anj7tlDvpiNxYU
-
encryption_key
H7ySIe3YXqpHozYioZRn
-
install_name
BlustacksHelp.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
BlustacksHelp
-
subdirectory
BlustacksHelp
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
104.244.72.108:9999
ncfsoe5550321hojhanhrzxqoijhkjhgjkhgf
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b9e-24.dat family_quasar behavioral2/memory/4092-26-0x00000000007A0000-0x00000000007FE000-memory.dmp family_quasar -
resource yara_rule behavioral2/files/0x000a000000023b9f-27.dat VenomRAT behavioral2/memory/2872-29-0x0000000000900000-0x0000000000918000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b9f-27.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 756 PowerShell.exe 756 PowerShell.exe -
Executes dropped EXE 2 IoCs
pid Process 4092 System.exe 2872 svhost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1868 schtasks.exe 3452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 756 PowerShell.exe 756 PowerShell.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe 2872 svhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 756 PowerShell.exe Token: SeDebugPrivilege 2872 svhost.exe Token: SeDebugPrivilege 4092 System.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4092 System.exe 2872 svhost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2764 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 82 PID 1804 wrote to memory of 2764 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 82 PID 2764 wrote to memory of 1868 2764 cmd.exe 84 PID 2764 wrote to memory of 1868 2764 cmd.exe 84 PID 1804 wrote to memory of 2340 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 85 PID 1804 wrote to memory of 2340 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 85 PID 2340 wrote to memory of 3452 2340 cmd.exe 87 PID 2340 wrote to memory of 3452 2340 cmd.exe 87 PID 1804 wrote to memory of 756 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 88 PID 1804 wrote to memory of 756 1804 2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe"C:\Users\Admin\AppData\Local\Temp\2f7103e6c45fd0f91657b9104ec213662ab46322eb5d8790144568b45d901f1bN.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /sc minute /mo 1 /RL HIGHEST /tn BlustacksHelper /tr %appdata%\Logistic\System.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /RL HIGHEST /tn BlustacksHelper /tr C:\Users\Admin\AppData\Roaming\Logistic\System.exe /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /sc minute /mo 1 /RL HIGHEST /tn Blustacks /tr %appdata%\Logistic\svhost.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /RL HIGHEST /tn Blustacks /tr C:\Users\Admin\AppData\Roaming\Logistic\svhost.exe /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3452
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath $env:appdata2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Users\Admin\AppData\Roaming\Logistic\System.exeC:\Users\Admin\AppData\Roaming\Logistic\System.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4092
-
C:\Users\Admin\AppData\Roaming\Logistic\svhost.exeC:\Users\Admin\AppData\Roaming\Logistic\svhost.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
348KB
MD530f290b9b4219713e4b49a726019fe68
SHA12fdb773ad1436b964d712ece9147c1b2f9973ad8
SHA25655cf1e6f2e5c517b59374ab01d7ace7f55a8944ecd3da5d0504704b796865ef9
SHA51254bf270b2075fbbc039b431e8802ea4cae4131880f9b95d4737cbde2e63c302f7e5f60a9aa92ff8b10b2a20e8f777aaad626587efbde4621530a9f66501e0aa9
-
Filesize
74KB
MD5248232d65b1270519512905808e12d44
SHA1dede341cac2a986edda5a3a08e5f5a5ea37811a1
SHA256dfcc60537938dac1dee3d4b4163ca33c61a9e3bae98fe63cf2b1addbd3aa4e5a
SHA5129440c013516e9a2c298b2cff2069f68a1d21c6d18bf7780bea2c0bf047a6f3b413cd279f341373d93ee09e9b6b06f825d7f6d123a6e4c07e55c11e4f677af4f0