Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 03:00

General

  • Target

    676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe

  • Size

    3.2MB

  • MD5

    0515143005b3e92fe50594bc1e30af7b

  • SHA1

    1f565728bcc13bf1e49760c98bd96e15dacb42fc

  • SHA256

    676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53

  • SHA512

    e813c528c5f1ff3b447b3701f3eb947d6697bf2880a39256d5c0e118cdebdb653651611ae3a03586871bce8d375c6035fdca1a7c8370605d3f68313928bbae3c

  • SSDEEP

    49152:tevXI22SsaNYfdPBldt698dBcjH3c0TbRSLoGd7/THHB72eh2NTA:UvY22SsaNYfdPBldt6+dBcjH3c0SZ

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

victim-hacked

C2

192.168.100.2:4444

Mutex

16229cd1-6d24-490c-9eb9-35319229cc03

Attributes
  • encryption_key

    6B74F0C858B7E90573D4E97997F2A082B9781250

  • install_name

    victim.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Service

  • subdirectory

    SubDir

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe
    "C:\Users\Admin\AppData\Local\Temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2868
    • \??\c:\users\admin\appdata\local\temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 
      c:\users\admin\appdata\local\temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\victim.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1748
      • C:\Windows\system32\SubDir\victim.exe
        "C:\Windows\system32\SubDir\victim.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2588
        • \??\c:\windows\resources\themes\explorer.exe
          c:\windows\resources\themes\explorer.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2956
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2272
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2176
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2084
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2340
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2960
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:02 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2648
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:03 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2308
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:04 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1764
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:2696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\System32\SubDir\victim.exe

      Filesize

      3.2MB

      MD5

      0515143005b3e92fe50594bc1e30af7b

      SHA1

      1f565728bcc13bf1e49760c98bd96e15dacb42fc

      SHA256

      676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53

      SHA512

      e813c528c5f1ff3b447b3701f3eb947d6697bf2880a39256d5c0e118cdebdb653651611ae3a03586871bce8d375c6035fdca1a7c8370605d3f68313928bbae3c

    • \Users\Admin\AppData\Local\Temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 

      Filesize

      3.1MB

      MD5

      5def20bc149e979f4c18e238edb01874

      SHA1

      813b5f3403652337ebf51b36f7c35c17a567786f

      SHA256

      6a98d500eab158f232d41cc190cb13f96749f818995d3bc01477f4231d7c7254

      SHA512

      fb51725d4367db8de825893235c34f6b1533f0a4cf25feac66efefa0c1d33a60d3723692cc9e00b4e0e032972e83e6b1f84d858284f1f1b0160e4e6c7e08bcfd

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      9745e1a7d3d8641274dc1ec38d6741e6

      SHA1

      fd3aa058c2a05339aa7e6dbad6441ad001c55b3a

      SHA256

      a41a9fe1852ed9a08e20e75a89480e16e0106fa19b7106202604f5a87c11aaa4

      SHA512

      26ce96b83ac3f742cd451238daad29eb6a36368d2bcfdcb930d70d1946f5e9adabdd12617b9690ba7b6bc8efa7f1023031457a963d6f6f7b65e9bb7aaaab68f4

    • \Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      20c2fe9a730ef6e2ee732d4b854f125b

      SHA1

      69236089a1291f96a66cc0d007944aff1697afdc

      SHA256

      95060d4832274d9f65af5111acb2602a2458c085a51b2ad585aa274cfe6cec27

      SHA512

      0123843886af98dcfbfb7563ba840efa53d4c565c4c11b62716d8c1a23d4678a1089d54f058e16790b73549761f3e0209845dc88cf8aa18dc73f44b2d37a78cc

    • \Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      18209cf72e3a4f1d1eb28e4b52696355

      SHA1

      6d7c829538f1cc1ff19b3d85cacb6f35da8aea5e

      SHA256

      6aab37034977154c607ed1b72601f92c95ec11138a2031a06b415cc7e1103393

      SHA512

      4d0afed64e29d52e3bc1c89c01153164331f981c8589ca91af0353adb905e4ccc371fea750cdb5dbaaf4cbf7456d551c399998478b22c89a21cee511fdd9991c

    • \Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      a79337b7cd17a672fe7961008f04a8f0

      SHA1

      370444a937cba407f2bff0e6dd1ea046403f88e8

      SHA256

      c7986be8b71f7782543c722f010b83c25ead4978117b7446022e8d9a739781d5

      SHA512

      c1be9b157e19ba8838a19eb22af69090a8537b276811cd0daa52384ccbe6bc362ce5984f2c47b1b151d999914cd088f52a9b2340ab44501590eb072810763616

    • memory/2084-70-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2084-49-0x00000000002D0000-0x00000000002EF000-memory.dmp

      Filesize

      124KB

    • memory/2176-82-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2272-75-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2272-28-0x00000000003D0000-0x00000000003EF000-memory.dmp

      Filesize

      124KB

    • memory/2340-83-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2368-73-0x000007FEF56D0000-0x000007FEF60BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2368-58-0x000007FEF56D3000-0x000007FEF56D4000-memory.dmp

      Filesize

      4KB

    • memory/2368-10-0x000007FEF56D3000-0x000007FEF56D4000-memory.dmp

      Filesize

      4KB

    • memory/2368-66-0x000007FEF56D0000-0x000007FEF60BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2368-11-0x0000000000D20000-0x0000000001044000-memory.dmp

      Filesize

      3.1MB

    • memory/2368-12-0x000007FEF56D0000-0x000007FEF60BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2588-81-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2868-16-0x0000000000280000-0x000000000029F000-memory.dmp

      Filesize

      124KB

    • memory/2868-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2868-76-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2956-80-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2956-79-0x0000000000230000-0x0000000000240000-memory.dmp

      Filesize

      64KB

    • memory/2960-64-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2960-67-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB