Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-12-2024 19:03
Behavioral task
behavioral1
Sample
clienbt.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
clienbt.exe
Resource
win11-20241007-en
General
-
Target
clienbt.exe
-
Size
3.1MB
-
MD5
94f7204cc10fd667deb7368911210228
-
SHA1
93c8e0d5b2194b1ae39537bfd3fe8ebd687c2e23
-
SHA256
dbd77fcf6dbd2f136713cfe6b28d7f79d1f5f9cdbb77b4431d3c1f5ed9a487a2
-
SHA512
1724176ea2e394f829b78db21831481696ee612c4bea3daba4c4e86ddd3e3dc6de1a77a901ed28e416f9869a135bf0f18d705fea650c177cb0160eccf5a4f2d0
-
SSDEEP
49152:nvwhBYjCO4Dt2d5aKCuVPzlEmVQL0wvwkaf7zboGdOTHHB72eh2NT:nvit2d5aKCuVPzlEmVQ0wvwff7H
Malware Config
Extracted
quasar
1.4.1
minecraft_updater
192.168.7.110:631
182d06ff-972f-4a96-b344-59a01694d374
-
encryption_key
C5904FDD788EA00F921C538B9FE80C0B0A0DE728
-
install_name
MinecraftUpdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MinecraftUpdater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/904-1-0x0000000000E60000-0x0000000001184000-memory.dmp family_quasar behavioral2/files/0x001b00000002ab7c-5.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3920 MinecraftUpdater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4576 schtasks.exe 1460 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 904 clienbt.exe Token: SeDebugPrivilege 3920 MinecraftUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3920 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 904 wrote to memory of 4576 904 clienbt.exe 77 PID 904 wrote to memory of 4576 904 clienbt.exe 77 PID 904 wrote to memory of 3920 904 clienbt.exe 79 PID 904 wrote to memory of 3920 904 clienbt.exe 79 PID 3920 wrote to memory of 1460 3920 MinecraftUpdater.exe 80 PID 3920 wrote to memory of 1460 3920 MinecraftUpdater.exe 80 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\clienbt.exe"C:\Users\Admin\AppData\Local\Temp\clienbt.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4576
-
-
C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD594f7204cc10fd667deb7368911210228
SHA193c8e0d5b2194b1ae39537bfd3fe8ebd687c2e23
SHA256dbd77fcf6dbd2f136713cfe6b28d7f79d1f5f9cdbb77b4431d3c1f5ed9a487a2
SHA5121724176ea2e394f829b78db21831481696ee612c4bea3daba4c4e86ddd3e3dc6de1a77a901ed28e416f9869a135bf0f18d705fea650c177cb0160eccf5a4f2d0