Analysis
-
max time kernel
37s -
max time network
43s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-12-2024 18:46
General
-
Target
AugustusInstaller.exe
-
Size
3.1MB
-
MD5
d0d6aa544dd91fa40db301efa7528019
-
SHA1
c02eb4a05fcd515bfb247dccc765c0e4b9ddfffa
-
SHA256
d27d4eb04172e979d6660f5f3ef9b9caced7a535c423571ad6685d76445a7d8d
-
SHA512
bc8961509e54ad4f3f96d224b1f44fb415358a9ebfada09b995860799cbb169fe39bcf6520cf3e9e30b63915633692c21e5dbc5af569da59f7e2d80fd36df532
-
SSDEEP
49152:mvaY52fyaSZOrPWluWBuGG5g5hCnc+p7RvkCqLoMdITHHB72eh2NT:mvv52fyaSZOrPWluWBDG5g5hCncX
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.2.15:4782
467b644d-3aa7-4652-9849-85b82e772b7e
-
encryption_key
D65D0AFFBB620AD32D40AB4922CBBC09E85999E8
-
install_name
Augustus.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3996-1-0x0000000000B80000-0x0000000000EA4000-memory.dmp family_quasar behavioral1/files/0x001900000002ab19-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4064 Augustus.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 876 schtasks.exe 4984 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3996 AugustusInstaller.exe Token: SeDebugPrivilege 4064 Augustus.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4064 Augustus.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3996 wrote to memory of 876 3996 AugustusInstaller.exe 79 PID 3996 wrote to memory of 876 3996 AugustusInstaller.exe 79 PID 3996 wrote to memory of 4064 3996 AugustusInstaller.exe 81 PID 3996 wrote to memory of 4064 3996 AugustusInstaller.exe 81 PID 4064 wrote to memory of 4984 4064 Augustus.exe 82 PID 4064 wrote to memory of 4984 4064 Augustus.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AugustusInstaller.exe"C:\Users\Admin\AppData\Local\Temp\AugustusInstaller.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:876
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe"C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Augustus.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4984
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d0d6aa544dd91fa40db301efa7528019
SHA1c02eb4a05fcd515bfb247dccc765c0e4b9ddfffa
SHA256d27d4eb04172e979d6660f5f3ef9b9caced7a535c423571ad6685d76445a7d8d
SHA512bc8961509e54ad4f3f96d224b1f44fb415358a9ebfada09b995860799cbb169fe39bcf6520cf3e9e30b63915633692c21e5dbc5af569da59f7e2d80fd36df532