Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 06:31
Behavioral task
behavioral1
Sample
SGVP Client System.exe
Resource
win7-20240903-en
General
-
Target
SGVP Client System.exe
-
Size
3.1MB
-
MD5
f611f4dd12e51ca7a946f308ebd5e04c
-
SHA1
2f7d049ec2b3ae6a8113b499d92ebc117eed890c
-
SHA256
d0ff0914a4014573716701a665b7950e49594452a6a7418a049553f8c7c1be73
-
SHA512
7057884406612bff108f1e315efacf83a99f1ec725b4496e737a57938b67edf5f23476b8f99395ec9f8ba355a68779fd5a2668b9caf0ca32b8862529eb413b83
-
SSDEEP
49152:rvuz92YpaQI6oPZlhP3ReybewozV+vJH4RoGdeJYTHHB72eh2NT:rv092YpaQI6oPZlhP3YybewozV+e
Malware Config
Extracted
quasar
1.4.1
SGVP
192.168.1.9:4782
150.129.206.176:4782
Ai-Sgvp-33452.portmap.host:33452
a27420c6-f346-4b84-b7bd-6b3eab5a43cb
-
encryption_key
09BBDA8FF0524296F02F8F81158F33C0AA74D487
-
install_name
User Application Data.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windowns Client Startup
-
subdirectory
Quasar
Signatures
-
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral1/memory/2268-1-0x0000000000A80000-0x0000000000DA4000-memory.dmp family_quasar behavioral1/files/0x0007000000019423-6.dat family_quasar behavioral1/memory/2656-9-0x0000000000F20000-0x0000000001244000-memory.dmp family_quasar behavioral1/memory/1336-24-0x0000000001210000-0x0000000001534000-memory.dmp family_quasar behavioral1/memory/2508-36-0x00000000012E0000-0x0000000001604000-memory.dmp family_quasar -
Executes dropped EXE 3 IoCs
pid Process 2656 User Application Data.exe 1336 User Application Data.exe 2508 User Application Data.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\system32\Quasar\User Application Data.exe SGVP Client System.exe File opened for modification C:\Windows\system32\Quasar\User Application Data.exe SGVP Client System.exe File opened for modification C:\Windows\system32\Quasar\User Application Data.exe User Application Data.exe File opened for modification C:\Windows\system32\Quasar\User Application Data.exe User Application Data.exe File opened for modification C:\Windows\system32\Quasar SGVP Client System.exe File opened for modification C:\Windows\system32\Quasar User Application Data.exe File opened for modification C:\Windows\system32\Quasar User Application Data.exe File opened for modification C:\Windows\system32\Quasar\User Application Data.exe User Application Data.exe File opened for modification C:\Windows\system32\Quasar User Application Data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 624 PING.EXE 688 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 624 PING.EXE 688 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2036 schtasks.exe 1816 schtasks.exe 2764 schtasks.exe 2776 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2268 SGVP Client System.exe Token: SeDebugPrivilege 2656 User Application Data.exe Token: SeDebugPrivilege 1336 User Application Data.exe Token: SeDebugPrivilege 2508 User Application Data.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2656 User Application Data.exe 1336 User Application Data.exe 2508 User Application Data.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2764 2268 SGVP Client System.exe 31 PID 2268 wrote to memory of 2764 2268 SGVP Client System.exe 31 PID 2268 wrote to memory of 2764 2268 SGVP Client System.exe 31 PID 2268 wrote to memory of 2656 2268 SGVP Client System.exe 33 PID 2268 wrote to memory of 2656 2268 SGVP Client System.exe 33 PID 2268 wrote to memory of 2656 2268 SGVP Client System.exe 33 PID 2656 wrote to memory of 2776 2656 User Application Data.exe 34 PID 2656 wrote to memory of 2776 2656 User Application Data.exe 34 PID 2656 wrote to memory of 2776 2656 User Application Data.exe 34 PID 2656 wrote to memory of 3040 2656 User Application Data.exe 36 PID 2656 wrote to memory of 3040 2656 User Application Data.exe 36 PID 2656 wrote to memory of 3040 2656 User Application Data.exe 36 PID 3040 wrote to memory of 2540 3040 cmd.exe 38 PID 3040 wrote to memory of 2540 3040 cmd.exe 38 PID 3040 wrote to memory of 2540 3040 cmd.exe 38 PID 3040 wrote to memory of 624 3040 cmd.exe 39 PID 3040 wrote to memory of 624 3040 cmd.exe 39 PID 3040 wrote to memory of 624 3040 cmd.exe 39 PID 3040 wrote to memory of 1336 3040 cmd.exe 40 PID 3040 wrote to memory of 1336 3040 cmd.exe 40 PID 3040 wrote to memory of 1336 3040 cmd.exe 40 PID 1336 wrote to memory of 2036 1336 User Application Data.exe 41 PID 1336 wrote to memory of 2036 1336 User Application Data.exe 41 PID 1336 wrote to memory of 2036 1336 User Application Data.exe 41 PID 1336 wrote to memory of 2108 1336 User Application Data.exe 44 PID 1336 wrote to memory of 2108 1336 User Application Data.exe 44 PID 1336 wrote to memory of 2108 1336 User Application Data.exe 44 PID 2108 wrote to memory of 2392 2108 cmd.exe 46 PID 2108 wrote to memory of 2392 2108 cmd.exe 46 PID 2108 wrote to memory of 2392 2108 cmd.exe 46 PID 2108 wrote to memory of 688 2108 cmd.exe 47 PID 2108 wrote to memory of 688 2108 cmd.exe 47 PID 2108 wrote to memory of 688 2108 cmd.exe 47 PID 2108 wrote to memory of 2508 2108 cmd.exe 48 PID 2108 wrote to memory of 2508 2108 cmd.exe 48 PID 2108 wrote to memory of 2508 2108 cmd.exe 48 PID 2508 wrote to memory of 1816 2508 User Application Data.exe 49 PID 2508 wrote to memory of 1816 2508 User Application Data.exe 49 PID 2508 wrote to memory of 1816 2508 User Application Data.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SGVP Client System.exe"C:\Users\Admin\AppData\Local\Temp\SGVP Client System.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
C:\Windows\system32\Quasar\User Application Data.exe"C:\Windows\system32\Quasar\User Application Data.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cZBkRUBnYKbv.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2540
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:624
-
-
C:\Windows\system32\Quasar\User Application Data.exe"C:\Windows\system32\Quasar\User Application Data.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\kiuGMfpqB4Ll.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:2392
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:688
-
-
C:\Windows\system32\Quasar\User Application Data.exe"C:\Windows\system32\Quasar\User Application Data.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:1816
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211B
MD5c7e46be49eca46596fc447e855327c10
SHA10d51450aa96d27f55d3e9788a4ba9a478c31930c
SHA2565289fc6d3efac77c8908e547d114ceca6b22a39debf98a427ac5b05d4bfdfccd
SHA5123213e545efddc11535da00d5aa3083c31bd537b66f548425a6a2846ba695dd1dcc2354d6c9d61ae2044aa81c06037d0f1b804974a3a90226a6dd53581be00879
-
Filesize
211B
MD545a53128d3074572474904e87f2866e3
SHA182c53ab5b6d7bee1af487895f4e03c6379c19dd0
SHA256d1dfcd6b8f002f394531358ac8e20b8d755b12b50039ea48db713cffedbfe0ed
SHA5124acbfcd3950bbbd7b257c1db38c53845cbe2f722d24b9d8e47813faee7ae2b5f12881d5a95589dd0c356e17d82d201153465ac3b06105d7952aea9e8dccab382
-
Filesize
3.1MB
MD5f611f4dd12e51ca7a946f308ebd5e04c
SHA12f7d049ec2b3ae6a8113b499d92ebc117eed890c
SHA256d0ff0914a4014573716701a665b7950e49594452a6a7418a049553f8c7c1be73
SHA5127057884406612bff108f1e315efacf83a99f1ec725b4496e737a57938b67edf5f23476b8f99395ec9f8ba355a68779fd5a2668b9caf0ca32b8862529eb413b83