Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 03:00
Behavioral task
behavioral1
Sample
676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe
Resource
win10v2004-20241007-en
General
-
Target
676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe
-
Size
3.2MB
-
MD5
0515143005b3e92fe50594bc1e30af7b
-
SHA1
1f565728bcc13bf1e49760c98bd96e15dacb42fc
-
SHA256
676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53
-
SHA512
e813c528c5f1ff3b447b3701f3eb947d6697bf2880a39256d5c0e118cdebdb653651611ae3a03586871bce8d375c6035fdca1a7c8370605d3f68313928bbae3c
-
SSDEEP
49152:tevXI22SsaNYfdPBldt698dBcjH3c0TbRSLoGd7/THHB72eh2NTA:UvY22SsaNYfdPBldt6+dBcjH3c0SZ
Malware Config
Extracted
quasar
1.4.1
victim-hacked
192.168.100.2:4444
16229cd1-6d24-490c-9eb9-35319229cc03
-
encryption_key
6B74F0C858B7E90573D4E97997F2A082B9781250
-
install_name
victim.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft Service
-
subdirectory
SubDir
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b82-7.dat family_quasar behavioral2/memory/4856-10-0x0000000000780000-0x0000000000AA4000-memory.dmp family_quasar behavioral2/files/0x000a000000023b84-20.dat family_quasar -
Executes dropped EXE 8 IoCs
pid Process 4856 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 220 icsys.icn.exe 3688 victim.exe 4340 explorer.exe 1896 spoolsv.exe 1808 explorer.exe 4600 svchost.exe 5036 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File created C:\Windows\system32\SubDir\victim.exe 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe File opened for modification C:\Windows\system32\SubDir\victim.exe 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe File opened for modification C:\Windows\system32\SubDir 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language victim.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe 220 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4340 explorer.exe 4600 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4856 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 220 icsys.icn.exe 220 icsys.icn.exe 3688 victim.exe 3688 victim.exe 4340 explorer.exe 4340 explorer.exe 1896 spoolsv.exe 1896 spoolsv.exe 1808 explorer.exe 1808 explorer.exe 4600 svchost.exe 4600 svchost.exe 5036 spoolsv.exe 5036 spoolsv.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4856 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 82 PID 5012 wrote to memory of 4856 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 82 PID 4856 wrote to memory of 3600 4856 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 83 PID 4856 wrote to memory of 3600 4856 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 83 PID 5012 wrote to memory of 220 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 85 PID 5012 wrote to memory of 220 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 85 PID 5012 wrote to memory of 220 5012 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 85 PID 4856 wrote to memory of 3688 4856 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 86 PID 4856 wrote to memory of 3688 4856 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 86 PID 4856 wrote to memory of 3688 4856 676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe 86 PID 220 wrote to memory of 4340 220 icsys.icn.exe 87 PID 220 wrote to memory of 4340 220 icsys.icn.exe 87 PID 220 wrote to memory of 4340 220 icsys.icn.exe 87 PID 4340 wrote to memory of 1896 4340 explorer.exe 88 PID 4340 wrote to memory of 1896 4340 explorer.exe 88 PID 4340 wrote to memory of 1896 4340 explorer.exe 88 PID 3688 wrote to memory of 1808 3688 victim.exe 89 PID 3688 wrote to memory of 1808 3688 victim.exe 89 PID 3688 wrote to memory of 1808 3688 victim.exe 89 PID 1896 wrote to memory of 4600 1896 spoolsv.exe 90 PID 1896 wrote to memory of 4600 1896 spoolsv.exe 90 PID 1896 wrote to memory of 4600 1896 spoolsv.exe 90 PID 4600 wrote to memory of 5036 4600 svchost.exe 91 PID 4600 wrote to memory of 5036 4600 svchost.exe 91 PID 4600 wrote to memory of 5036 4600 svchost.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe"C:\Users\Admin\AppData\Local\Temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\users\admin\appdata\local\temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exec:\users\admin\appdata\local\temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\victim.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3600
-
-
C:\Windows\system32\SubDir\victim.exe"C:\Windows\system32\SubDir\victim.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5036
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53.exe
Filesize3.1MB
MD55def20bc149e979f4c18e238edb01874
SHA1813b5f3403652337ebf51b36f7c35c17a567786f
SHA2566a98d500eab158f232d41cc190cb13f96749f818995d3bc01477f4231d7c7254
SHA512fb51725d4367db8de825893235c34f6b1533f0a4cf25feac66efefa0c1d33a60d3723692cc9e00b4e0e032972e83e6b1f84d858284f1f1b0160e4e6c7e08bcfd
-
Filesize
135KB
MD518209cf72e3a4f1d1eb28e4b52696355
SHA16d7c829538f1cc1ff19b3d85cacb6f35da8aea5e
SHA2566aab37034977154c607ed1b72601f92c95ec11138a2031a06b415cc7e1103393
SHA5124d0afed64e29d52e3bc1c89c01153164331f981c8589ca91af0353adb905e4ccc371fea750cdb5dbaaf4cbf7456d551c399998478b22c89a21cee511fdd9991c
-
Filesize
135KB
MD520c2fe9a730ef6e2ee732d4b854f125b
SHA169236089a1291f96a66cc0d007944aff1697afdc
SHA25695060d4832274d9f65af5111acb2602a2458c085a51b2ad585aa274cfe6cec27
SHA5120123843886af98dcfbfb7563ba840efa53d4c565c4c11b62716d8c1a23d4678a1089d54f058e16790b73549761f3e0209845dc88cf8aa18dc73f44b2d37a78cc
-
Filesize
135KB
MD5ca49cce76cef733fae4348b79abb3718
SHA1ef018de66625d7823fc881cc5966cb863ecc142a
SHA256a4f53889aef548433bc06a4d6f31b343bae9d133507adeb129b674381e580922
SHA512a9d558cb319a01025d1eb952343be0b95de973d0c0fcb2b0498740c387bd7574258bca94f457ec42fe64a7f338e4343b9b1802aea5cb1158c21ac11b7fe310df
-
Filesize
135KB
MD54eecd7010c8dc670897f9f31c747ce37
SHA11d146b4cc8d306fbb648af257de095f1c31954da
SHA2561b54f098e8cbbfcf92f8d41be836ec7768c24ecc48c5fdc78e347fd93d1ab571
SHA512a3ab250194572cf35323d861f4446b07891242b1a691635927dfbb87090887be2cb97b7646cf60db60c762fb0878a0c300e73498a3fbe7ce8be6faa29e49f789
-
Filesize
3.2MB
MD50515143005b3e92fe50594bc1e30af7b
SHA11f565728bcc13bf1e49760c98bd96e15dacb42fc
SHA256676a40f2c599ffe574343860e190a7c293ade8e32cd83b66f6ff6f8d4c0b3a53
SHA512e813c528c5f1ff3b447b3701f3eb947d6697bf2880a39256d5c0e118cdebdb653651611ae3a03586871bce8d375c6035fdca1a7c8370605d3f68313928bbae3c