Analysis
-
max time kernel
116s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 05:02
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
84f03f8b89bb599361ebf000c3fd13ce
-
SHA1
5507081e72e26ec9bc2d25dec2a14714f7b03318
-
SHA256
f0992e9e2ea5d5796c8c5c622f7da893d8151d14c46de8b1847a62d7afd08c6d
-
SHA512
09e5bc0b31a2980a3f1e51dc5964c67147aa16bc7124a5f06e237f79b5436810868f7326afbb35ab25ee1559c531ca15e10f8262aa1a061ac45737a42599f464
-
SSDEEP
49152:b+KL12toaDsbQPUl+DvccTzVPWj1GTiQjq3Q8Z4IoGtpTHHB72eh2NTd:b+Y12toaDsbQPUl+DvZzVPWjQS7Zl
Malware Config
Extracted
quasar
1.4.1
Slave
85.209.133.13:111
ec2a0662-37ce-47bc-80e5-416bb4627d9b
-
encryption_key
D55A711D57A556B5F8341D90111BDC78FB07B322
-
install_name
System.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
system
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/1868-1-0x0000000000C40000-0x0000000000F62000-memory.dmp family_quasar behavioral2/files/0x000a000000023b97-5.dat family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation System.exe -
Executes dropped EXE 2 IoCs
pid Process 844 System.exe 2316 ZAcNDgH11MfD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZAcNDgH11MfD.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2276 schtasks.exe 4708 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1868 Client-built.exe Token: SeDebugPrivilege 844 System.exe Token: SeDebugPrivilege 2316 ZAcNDgH11MfD.exe Token: 33 2500 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2500 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 844 System.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2276 1868 Client-built.exe 82 PID 1868 wrote to memory of 2276 1868 Client-built.exe 82 PID 1868 wrote to memory of 844 1868 Client-built.exe 84 PID 1868 wrote to memory of 844 1868 Client-built.exe 84 PID 844 wrote to memory of 4708 844 System.exe 85 PID 844 wrote to memory of 4708 844 System.exe 85 PID 844 wrote to memory of 2316 844 System.exe 96 PID 844 wrote to memory of 2316 844 System.exe 96 PID 844 wrote to memory of 2316 844 System.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "system" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\System.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
C:\Users\Admin\AppData\Roaming\SubDir\System.exe"C:\Users\Admin\AppData\Roaming\SubDir\System.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "system" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\System.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\ZAcNDgH11MfD.exe"C:\Users\Admin\AppData\Local\Temp\ZAcNDgH11MfD.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x300 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871KB
MD5f8c9192c20757533eaca23b03f66a85b
SHA1e3a9115956b66808438345ba32fccd4092cfb474
SHA2565ad88dd4b979320a632275509d94a990538928561ec3ac55ff6ccdcf6f35d8d6
SHA5123fff05a1e371af1e273c413175f6abe7d374dab6cf46abb6830b45c51286695cd2ae3dd128763d0aa48924ff13634270ecac07c5cad04d406cb7ff3f8aac32db
-
Filesize
3.1MB
MD584f03f8b89bb599361ebf000c3fd13ce
SHA15507081e72e26ec9bc2d25dec2a14714f7b03318
SHA256f0992e9e2ea5d5796c8c5c622f7da893d8151d14c46de8b1847a62d7afd08c6d
SHA51209e5bc0b31a2980a3f1e51dc5964c67147aa16bc7124a5f06e237f79b5436810868f7326afbb35ab25ee1559c531ca15e10f8262aa1a061ac45737a42599f464