Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 16:37
Behavioral task
behavioral1
Sample
7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe
Resource
win7-20240903-en
General
-
Target
7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe
-
Size
3.1MB
-
MD5
8cadd9d05b28bdf0f3caeed0ce516d9c
-
SHA1
b6b04039117acc2ffaef424eeaf6d99b4086487f
-
SHA256
7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7
-
SHA512
2e1c01240ac20ac2a374926893fa4796d4f4daa8f479c1c55ad62791ca0cb32cc8baf192d849abefc9c1a88d69045f4aeb563105d5d54fcac049b3b8f2ba7fee
-
SSDEEP
49152:zvghBYjCO4Dt2d5aKCuVPzlEmVQL0wvwkaj3QaEfeak/l4XoGdPTHHB72eh2NT:zvSt2d5aKCuVPzlEmVQ0wvwfj3QSY
Malware Config
Extracted
quasar
1.4.1
Manager
serveo.net:11453
a851cc5b-e50f-4270-9929-06c6323cdb3d
-
encryption_key
5A3C537E5FB2739D5B2468FC37915D58EF4AC5EA
-
install_name
Runtime broker.exe
-
log_directory
Microsoftsessential
-
reconnect_delay
3000
-
startup_key
Runtime broker
-
subdirectory
Microsoft_Essentials
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/4952-1-0x00000000001C0000-0x00000000004E4000-memory.dmp family_quasar behavioral2/files/0x0007000000023c96-7.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3344 Runtime broker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3488 schtasks.exe 5016 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4952 7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe Token: SeDebugPrivilege 3344 Runtime broker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3488 4952 7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe 82 PID 4952 wrote to memory of 3488 4952 7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe 82 PID 4952 wrote to memory of 3344 4952 7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe 84 PID 4952 wrote to memory of 3344 4952 7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe 84 PID 3344 wrote to memory of 5016 3344 Runtime broker.exe 85 PID 3344 wrote to memory of 5016 3344 Runtime broker.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe"C:\Users\Admin\AppData\Local\Temp\7fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft_Essentials\Runtime broker.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3488
-
-
C:\Users\Admin\AppData\Roaming\Microsoft_Essentials\Runtime broker.exe"C:\Users\Admin\AppData\Roaming\Microsoft_Essentials\Runtime broker.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft_Essentials\Runtime broker.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58cadd9d05b28bdf0f3caeed0ce516d9c
SHA1b6b04039117acc2ffaef424eeaf6d99b4086487f
SHA2567fc8b932158ef8ced6bebf0c254f96cd6cd4cd1a0fd3a90e54652768c477aaf7
SHA5122e1c01240ac20ac2a374926893fa4796d4f4daa8f479c1c55ad62791ca0cb32cc8baf192d849abefc9c1a88d69045f4aeb563105d5d54fcac049b3b8f2ba7fee