Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/12/2024, 02:10

General

  • Target

    viltracoin-qt.exe

  • Size

    82.5MB

  • MD5

    959a666390a5dcad9994b132fd286ef8

  • SHA1

    a2d17928f1e7178c25fe0dd07bdb3f2bd9f6c4ca

  • SHA256

    4feb1b58d3941d021d0525cf544ea5df9fc3e3ed3d32a621801072ad3a5a4da8

  • SHA512

    fcbe47048a4448c51b042832c8ff2766798682fb7cf4ce68e2b1523d6f14f39b1a43c7f3eec28005314c22e86060d476552606900e382c5c425abc729877b946

  • SSDEEP

    393216:34TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa2X:3KRVQxhu0P8Lq1LEvxOOx5Sh

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Viltrac

C2

51.15.17.193:4782

Mutex

d099b659-69af-41e2-9d7f-a5e64da5be06

Attributes
  • encryption_key

    97599F6E5D14A784CC4DD36B18A277119042FDA8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • System Binary Proxy Execution: Regsvcs/Regasm 1 TTPs 2 IoCs

    Abuse Regasm to proxy execution of malicious code.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\viltracoin-qt.exe
    "C:\Users\Admin\AppData\Local\Temp\viltracoin-qt.exe"
    1⤵
    • System Binary Proxy Execution: Regsvcs/Regasm
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "type C:\Users\Admin\AppData\Local\Temp\temp.ps1 | powershell.exe -noprofile -"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\temp.ps1 "
        3⤵
          PID:5104
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -noprofile -
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:872
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\aq12y04u\aq12y04u.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES733C.tmp" "c:\Users\Admin\AppData\Local\Temp\aq12y04u\CSCE7AAB368BFDE46E4BEE452D1741DED91.TMP"
              5⤵
                PID:2268
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"
          2⤵
          • System Binary Proxy Execution: Regsvcs/Regasm
          • Suspicious use of WriteProcessMemory
          PID:4804
          • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
            C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:4880
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\viltracoin-qt1.exe"
          2⤵
            PID:4904

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RES733C.tmp

          Filesize

          1KB

          MD5

          fc394f01fd5fc207725b4830ac45b038

          SHA1

          03624b7272f91729e83189c59bb2862c030a1cf6

          SHA256

          098e9b138b263201671ceea9b496fb36b53631dec2514e700ed90b299cf23b48

          SHA512

          2656cfbcae012d9b3eb75b1bfae52247e72f279bbcd598d916f987c6377a223fbce0efd98b35584299a1615879e34b5621de75159e1fe64882dc6db15a30aadf

        • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe

          Filesize

          4.7MB

          MD5

          2884a477526c8308e9492845449e7e55

          SHA1

          eee9ad47bffe627c71529e81bf9daaf95ee3df30

          SHA256

          55c5b0b62609618558f51c5f35380291a4337cae8b14e65dd5ce7b226e9e4096

          SHA512

          d4e3694af590f82a1464e403c05c4f7ed34dcd9a91b5b4930d72ae406625952f332b22f3a15aba4a2a412b1967ccb09a7383d2c4140752a1b296e9326f89b5f3

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vaixqfpp.rc0.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\aq12y04u\aq12y04u.dll

          Filesize

          3KB

          MD5

          91fd8a6b4b3a7b5892b62ddc5c3ff027

          SHA1

          b47d93c859caef5c41f355efd1e018fa747e360f

          SHA256

          6da62c31ea0aa120a915cb9e94b3ee0b5da9bf19db282cfead836da12bfe4fef

          SHA512

          39eb1c22391254fd7c7fe0bd040a377ebd0640b078b7cfba93ddb4d5903ed2dfa8952f48978910c39bc7583353be96c44ae5e8edb7e11597323483830fd857c3

        • C:\Users\Admin\AppData\Local\Temp\temp.ps1

          Filesize

          379B

          MD5

          18047e197c6820559730d01035b2955a

          SHA1

          277179be54bba04c0863aebd496f53b129d47464

          SHA256

          348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3

          SHA512

          1942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877

        • C:\Users\Admin\AppData\Local\Temp\viltracoin-qt1.exe

          Filesize

          2KB

          MD5

          e53fdf76753edcd8773ab17ae968bfd6

          SHA1

          4bea38cd83442080bdf51cd1db206715f9198955

          SHA256

          3d70ce95eb1eb78620cc57fe1a6a479e6f2d70508bf813238e573863df000d6e

          SHA512

          f168878f0d1047ce3775a511ee5cffed3afc7a47081304b4c884b6099dace99a17e473b727f5afcc87b0e0c1df461439f821b2dbcf341f94b9c206e8487c7888

        • \??\c:\Users\Admin\AppData\Local\Temp\aq12y04u\CSCE7AAB368BFDE46E4BEE452D1741DED91.TMP

          Filesize

          652B

          MD5

          1353ead0e46096e04a7952e0fb816c1a

          SHA1

          841291d5dac663ecaec3e80d098379506524c36f

          SHA256

          76b9eb363a585882ffbcbd0d02f7717418ef8e3096c9990001b3dd9d074aaa00

          SHA512

          4946aa19085e07f9f645fa65596145ff41794466269073d6c1f87dda03f5a5be8c00a3de6bb47b0c30f1e640c709a611f1ebd38156064fa956e66f5f0d0da913

        • \??\c:\Users\Admin\AppData\Local\Temp\aq12y04u\aq12y04u.0.cs

          Filesize

          311B

          MD5

          7bc8de6ac8041186ed68c07205656943

          SHA1

          673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75

          SHA256

          36865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697

          SHA512

          0495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba

        • \??\c:\Users\Admin\AppData\Local\Temp\aq12y04u\aq12y04u.cmdline

          Filesize

          369B

          MD5

          6a3eb0bcac51198d9c60f4b27ede5045

          SHA1

          bc0f2da46645ee8b86a746e3902d7ff4f289be0a

          SHA256

          d7ee958046a581f440c0ed5510f7131501aaa00f1695297d29768988c4e38a11

          SHA512

          75a1a9011d76d954aaa451f1cce7cec076a020318dbb61406fcc0fc3d11f41ad57e8334dfd7652000088a2961e1ebf4f179506446f19d9541e919a2e81337c66

        • memory/872-14-0x0000025CFFE00000-0x0000025CFFE76000-memory.dmp

          Filesize

          472KB

        • memory/872-27-0x0000025C9BE90000-0x0000025C9BE98000-memory.dmp

          Filesize

          32KB

        • memory/872-13-0x0000025CFFD30000-0x0000025CFFD74000-memory.dmp

          Filesize

          272KB

        • memory/872-3-0x0000025CFF8F0000-0x0000025CFF912000-memory.dmp

          Filesize

          136KB

        • memory/4880-39-0x00000242E8300000-0x00000242E8624000-memory.dmp

          Filesize

          3.1MB

        • memory/4880-40-0x00000242CF550000-0x00000242CF5A0000-memory.dmp

          Filesize

          320KB

        • memory/4880-41-0x00000242E8B60000-0x00000242E8C12000-memory.dmp

          Filesize

          712KB

        • memory/4880-44-0x00000242CF5A0000-0x00000242CF5B2000-memory.dmp

          Filesize

          72KB

        • memory/4880-45-0x00000242E8710000-0x00000242E874C000-memory.dmp

          Filesize

          240KB