Analysis
-
max time kernel
125s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 05:46
Behavioral task
behavioral1
Sample
Client-built1.exe
Resource
win7-20240903-en
General
-
Target
Client-built1.exe
-
Size
3.1MB
-
MD5
0213a1dc625eaf82e4d4a94ef9155eeb
-
SHA1
af3df68c68a7070079b123ce2f22389a5aa768df
-
SHA256
532a988eeae201a337f328d2120f8af790042da93735c0fc0c17a1063fdf7f60
-
SHA512
67277e020c3776695b2fb854e834a2850dcfd378fed62b84414ead8c1dce7d1859b2799c973f599a4661124912a49c685c8438b3df7e4012ee7777b1ce489f26
-
SSDEEP
49152:Wvkt62XlaSFNWPjljiFa2RoUYIAQYiimzItoGdUTHHB72eh2NT:Wv462XlaSFNWPjljiFXRoUYINYiE
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.20.5:4782
cd5c1121-523a-481c-bbf0-684c5522dd85
-
encryption_key
D49DA0049C9A948B065557C5F7F0C812465A95EA
-
install_name
argonui.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ArgonUpdater
-
subdirectory
Argon
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2700-1-0x0000000001320000-0x0000000001644000-memory.dmp family_quasar behavioral1/files/0x0008000000015ed2-6.dat family_quasar behavioral1/memory/2704-10-0x00000000009B0000-0x0000000000CD4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2704 argonui.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe 2724 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2700 Client-built1.exe Token: SeDebugPrivilege 2704 argonui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 argonui.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2724 2700 Client-built1.exe 31 PID 2700 wrote to memory of 2724 2700 Client-built1.exe 31 PID 2700 wrote to memory of 2724 2700 Client-built1.exe 31 PID 2700 wrote to memory of 2704 2700 Client-built1.exe 33 PID 2700 wrote to memory of 2704 2700 Client-built1.exe 33 PID 2700 wrote to memory of 2704 2700 Client-built1.exe 33 PID 2704 wrote to memory of 2592 2704 argonui.exe 34 PID 2704 wrote to memory of 2592 2704 argonui.exe 34 PID 2704 wrote to memory of 2592 2704 argonui.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built1.exe"C:\Users\Admin\AppData\Local\Temp\Client-built1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "ArgonUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Argon\argonui.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2724
-
-
C:\Users\Admin\AppData\Roaming\Argon\argonui.exe"C:\Users\Admin\AppData\Roaming\Argon\argonui.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "ArgonUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Argon\argonui.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD50213a1dc625eaf82e4d4a94ef9155eeb
SHA1af3df68c68a7070079b123ce2f22389a5aa768df
SHA256532a988eeae201a337f328d2120f8af790042da93735c0fc0c17a1063fdf7f60
SHA51267277e020c3776695b2fb854e834a2850dcfd378fed62b84414ead8c1dce7d1859b2799c973f599a4661124912a49c685c8438b3df7e4012ee7777b1ce489f26