Analysis
-
max time kernel
20s -
max time network
21s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
24-12-2024 19:19
General
-
Target
AugustusInstaller.exe
-
Size
3.1MB
-
MD5
d0d6aa544dd91fa40db301efa7528019
-
SHA1
c02eb4a05fcd515bfb247dccc765c0e4b9ddfffa
-
SHA256
d27d4eb04172e979d6660f5f3ef9b9caced7a535c423571ad6685d76445a7d8d
-
SHA512
bc8961509e54ad4f3f96d224b1f44fb415358a9ebfada09b995860799cbb169fe39bcf6520cf3e9e30b63915633692c21e5dbc5af569da59f7e2d80fd36df532
-
SSDEEP
49152:mvaY52fyaSZOrPWluWBuGG5g5hCnc+p7RvkCqLoMdITHHB72eh2NT:mvv52fyaSZOrPWluWBDG5g5hCncX
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.2.15:4782
467b644d-3aa7-4652-9849-85b82e772b7e
-
encryption_key
D65D0AFFBB620AD32D40AB4922CBBC09E85999E8
-
install_name
Augustus.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/1044-1-0x0000000000DD0000-0x00000000010F4000-memory.dmp family_quasar behavioral1/files/0x0028000000046239-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3492 Augustus.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4220 schtasks.exe 1260 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1044 AugustusInstaller.exe Token: SeDebugPrivilege 3492 Augustus.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3492 Augustus.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1260 1044 AugustusInstaller.exe 82 PID 1044 wrote to memory of 1260 1044 AugustusInstaller.exe 82 PID 1044 wrote to memory of 3492 1044 AugustusInstaller.exe 84 PID 1044 wrote to memory of 3492 1044 AugustusInstaller.exe 84 PID 3492 wrote to memory of 4220 3492 Augustus.exe 85 PID 3492 wrote to memory of 4220 3492 Augustus.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AugustusInstaller.exe"C:\Users\Admin\AppData\Local\Temp\AugustusInstaller.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1260
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe"C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d0d6aa544dd91fa40db301efa7528019
SHA1c02eb4a05fcd515bfb247dccc765c0e4b9ddfffa
SHA256d27d4eb04172e979d6660f5f3ef9b9caced7a535c423571ad6685d76445a7d8d
SHA512bc8961509e54ad4f3f96d224b1f44fb415358a9ebfada09b995860799cbb169fe39bcf6520cf3e9e30b63915633692c21e5dbc5af569da59f7e2d80fd36df532