Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
viltracoin-qt.exe
Resource
win7-20240903-en
General
-
Target
viltracoin-qt.exe
-
Size
82.5MB
-
MD5
959a666390a5dcad9994b132fd286ef8
-
SHA1
a2d17928f1e7178c25fe0dd07bdb3f2bd9f6c4ca
-
SHA256
4feb1b58d3941d021d0525cf544ea5df9fc3e3ed3d32a621801072ad3a5a4da8
-
SHA512
fcbe47048a4448c51b042832c8ff2766798682fb7cf4ce68e2b1523d6f14f39b1a43c7f3eec28005314c22e86060d476552606900e382c5c425abc729877b946
-
SSDEEP
393216:34TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa2X:3KRVQxhu0P8Lq1LEvxOOx5Sh
Malware Config
Extracted
quasar
1.4.1
Viltrac
51.15.17.193:4782
d099b659-69af-41e2-9d7f-a5e64da5be06
-
encryption_key
97599F6E5D14A784CC4DD36B18A277119042FDA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4880-39-0x00000242E8300000-0x00000242E8624000-memory.dmp family_quasar -
System Binary Proxy Execution: Regsvcs/Regasm 1 TTPs 2 IoCs
Abuse Regasm to proxy execution of malicious code.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\RegAsm.exe viltracoin-qt.exe Key opened \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\RegAsm.exe cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tempup.url viltracoin-qt.exe -
Executes dropped EXE 1 IoCs
pid Process 4880 RegAsm.exe -
pid Process 872 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 872 powershell.exe 872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 4880 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1612 1964 viltracoin-qt.exe 85 PID 1964 wrote to memory of 1612 1964 viltracoin-qt.exe 85 PID 1612 wrote to memory of 5104 1612 cmd.exe 86 PID 1612 wrote to memory of 5104 1612 cmd.exe 86 PID 1612 wrote to memory of 872 1612 cmd.exe 87 PID 1612 wrote to memory of 872 1612 cmd.exe 87 PID 872 wrote to memory of 2924 872 powershell.exe 88 PID 872 wrote to memory of 2924 872 powershell.exe 88 PID 2924 wrote to memory of 2268 2924 csc.exe 89 PID 2924 wrote to memory of 2268 2924 csc.exe 89 PID 1964 wrote to memory of 4804 1964 viltracoin-qt.exe 90 PID 1964 wrote to memory of 4804 1964 viltracoin-qt.exe 90 PID 4804 wrote to memory of 4880 4804 cmd.exe 91 PID 4804 wrote to memory of 4880 4804 cmd.exe 91 PID 1964 wrote to memory of 4904 1964 viltracoin-qt.exe 92 PID 1964 wrote to memory of 4904 1964 viltracoin-qt.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\viltracoin-qt.exe"C:\Users\Admin\AppData\Local\Temp\viltracoin-qt.exe"1⤵
- System Binary Proxy Execution: Regsvcs/Regasm
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "type C:\Users\Admin\AppData\Local\Temp\temp.ps1 | powershell.exe -noprofile -"2⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\temp.ps1 "3⤵PID:5104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -noprofile -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aq12y04u\aq12y04u.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES733C.tmp" "c:\Users\Admin\AppData\Local\Temp\aq12y04u\CSCE7AAB368BFDE46E4BEE452D1741DED91.TMP"5⤵PID:2268
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- System Binary Proxy Execution: Regsvcs/Regasm
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\RegAsm.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\viltracoin-qt1.exe"2⤵PID:4904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc394f01fd5fc207725b4830ac45b038
SHA103624b7272f91729e83189c59bb2862c030a1cf6
SHA256098e9b138b263201671ceea9b496fb36b53631dec2514e700ed90b299cf23b48
SHA5122656cfbcae012d9b3eb75b1bfae52247e72f279bbcd598d916f987c6377a223fbce0efd98b35584299a1615879e34b5621de75159e1fe64882dc6db15a30aadf
-
Filesize
4.7MB
MD52884a477526c8308e9492845449e7e55
SHA1eee9ad47bffe627c71529e81bf9daaf95ee3df30
SHA25655c5b0b62609618558f51c5f35380291a4337cae8b14e65dd5ce7b226e9e4096
SHA512d4e3694af590f82a1464e403c05c4f7ed34dcd9a91b5b4930d72ae406625952f332b22f3a15aba4a2a412b1967ccb09a7383d2c4140752a1b296e9326f89b5f3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD591fd8a6b4b3a7b5892b62ddc5c3ff027
SHA1b47d93c859caef5c41f355efd1e018fa747e360f
SHA2566da62c31ea0aa120a915cb9e94b3ee0b5da9bf19db282cfead836da12bfe4fef
SHA51239eb1c22391254fd7c7fe0bd040a377ebd0640b078b7cfba93ddb4d5903ed2dfa8952f48978910c39bc7583353be96c44ae5e8edb7e11597323483830fd857c3
-
Filesize
379B
MD518047e197c6820559730d01035b2955a
SHA1277179be54bba04c0863aebd496f53b129d47464
SHA256348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3
SHA5121942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877
-
Filesize
2KB
MD5e53fdf76753edcd8773ab17ae968bfd6
SHA14bea38cd83442080bdf51cd1db206715f9198955
SHA2563d70ce95eb1eb78620cc57fe1a6a479e6f2d70508bf813238e573863df000d6e
SHA512f168878f0d1047ce3775a511ee5cffed3afc7a47081304b4c884b6099dace99a17e473b727f5afcc87b0e0c1df461439f821b2dbcf341f94b9c206e8487c7888
-
Filesize
652B
MD51353ead0e46096e04a7952e0fb816c1a
SHA1841291d5dac663ecaec3e80d098379506524c36f
SHA25676b9eb363a585882ffbcbd0d02f7717418ef8e3096c9990001b3dd9d074aaa00
SHA5124946aa19085e07f9f645fa65596145ff41794466269073d6c1f87dda03f5a5be8c00a3de6bb47b0c30f1e640c709a611f1ebd38156064fa956e66f5f0d0da913
-
Filesize
311B
MD57bc8de6ac8041186ed68c07205656943
SHA1673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75
SHA25636865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697
SHA5120495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba
-
Filesize
369B
MD56a3eb0bcac51198d9c60f4b27ede5045
SHA1bc0f2da46645ee8b86a746e3902d7ff4f289be0a
SHA256d7ee958046a581f440c0ed5510f7131501aaa00f1695297d29768988c4e38a11
SHA51275a1a9011d76d954aaa451f1cce7cec076a020318dbb61406fcc0fc3d11f41ad57e8334dfd7652000088a2961e1ebf4f179506446f19d9541e919a2e81337c66