Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:39
Behavioral task
behavioral1
Sample
Authenticator.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Authenticator.exe
Resource
win10v2004-20241007-en
General
-
Target
Authenticator.exe
-
Size
375KB
-
MD5
85b43fd8aa9d8b09b8613f2fa47c6bb0
-
SHA1
3729c0739c24b7ed9fda30684173a869c7398e80
-
SHA256
6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9
-
SHA512
2898dc0c44a6543136281cf0bbdc03c3cc958098366773fc31ab047c2819e9df3d2b5596ded0d9a2811d915d4ced0404494dfa3381572c56dda9bf2772706ef2
-
SSDEEP
6144:YbqQ4i1FFiEKZVSQZzs5jQKbgQ203StbjjSQkzaozVVqH:CpliPScgCy73StbjjSQkVzV0H
Malware Config
Extracted
quasar
1.3.0.0
Authenticator
iamaskibiditoilet-58299.portmap.host:58299
QSR_MUTEX_bNzknSVeSVx21JnqhQ
-
encryption_key
wAIAzlOLR0d5V3YI1aCM
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/2524-1-0x0000000000ED0000-0x0000000000F34000-memory.dmp family_quasar behavioral2/files/0x000a000000023b69-11.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3528 Runtime Broker.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Authenticator.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2896 schtasks.exe 4304 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2524 Authenticator.exe Token: SeDebugPrivilege 3528 Runtime Broker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3528 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2896 2524 Authenticator.exe 83 PID 2524 wrote to memory of 2896 2524 Authenticator.exe 83 PID 2524 wrote to memory of 2896 2524 Authenticator.exe 83 PID 2524 wrote to memory of 3528 2524 Authenticator.exe 85 PID 2524 wrote to memory of 3528 2524 Authenticator.exe 85 PID 2524 wrote to memory of 3528 2524 Authenticator.exe 85 PID 3528 wrote to memory of 4304 3528 Runtime Broker.exe 86 PID 3528 wrote to memory of 4304 3528 Runtime Broker.exe 86 PID 3528 wrote to memory of 4304 3528 Runtime Broker.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Authenticator.exe"C:\Users\Admin\AppData\Local\Temp\Authenticator.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Authenticator.exe" /rl HIGHEST /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2896
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD585b43fd8aa9d8b09b8613f2fa47c6bb0
SHA13729c0739c24b7ed9fda30684173a869c7398e80
SHA2566eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9
SHA5122898dc0c44a6543136281cf0bbdc03c3cc958098366773fc31ab047c2819e9df3d2b5596ded0d9a2811d915d4ced0404494dfa3381572c56dda9bf2772706ef2