Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 19:14
Behavioral task
behavioral1
Sample
AAAHHHH.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
AAAHHHH.exe
Resource
win11-20241007-en
General
-
Target
AAAHHHH.exe
-
Size
3.1MB
-
MD5
6088aaa8d0ba77fe7649c56226fcf79e
-
SHA1
43f7ac7827c3c57ac58b6093757bcaa637db7698
-
SHA256
096f1692176785aa88872660aaefd08b995de5179f95947e3ab48e85158591af
-
SHA512
c2f36efe8e5039d4c48a773c14a6925becb5ca30aaaa1d5249a4e9cc36799680e32f018d03a9ed01904751a1d15189b82eb90becc34e2aebde926ab18eb8727d
-
SSDEEP
49152:ov55E2VFatysqPFlLC24fdxyG5NJXheUMfcioGdEDTHHB72eh2NT:ovHE2VFatysqPFlLC2IdxyG5NJXheV
Malware Config
Extracted
quasar
1.4.1
minecraft_updater
169.254.197.237:139
192.168.7.110:139
127.0.0.1:139
0.0.0.0:139
98.97.12.133:139
182d06ff-972f-4a96-b344-59a01694d374
-
encryption_key
C5904FDD788EA00F921C538B9FE80C0B0A0DE728
-
install_name
MinecraftUpdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MinecraftUpdater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/2140-1-0x0000000000EF0000-0x0000000001214000-memory.dmp family_quasar behavioral1/files/0x000b000000023b59-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2440 MinecraftUpdater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2456 schtasks.exe 4652 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2140 AAAHHHH.exe Token: SeDebugPrivilege 2440 MinecraftUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2440 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2456 2140 AAAHHHH.exe 84 PID 2140 wrote to memory of 2456 2140 AAAHHHH.exe 84 PID 2140 wrote to memory of 2440 2140 AAAHHHH.exe 86 PID 2140 wrote to memory of 2440 2140 AAAHHHH.exe 86 PID 2440 wrote to memory of 4652 2440 MinecraftUpdater.exe 87 PID 2440 wrote to memory of 4652 2440 MinecraftUpdater.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AAAHHHH.exe"C:\Users\Admin\AppData\Local\Temp\AAAHHHH.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2456
-
-
C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56088aaa8d0ba77fe7649c56226fcf79e
SHA143f7ac7827c3c57ac58b6093757bcaa637db7698
SHA256096f1692176785aa88872660aaefd08b995de5179f95947e3ab48e85158591af
SHA512c2f36efe8e5039d4c48a773c14a6925becb5ca30aaaa1d5249a4e9cc36799680e32f018d03a9ed01904751a1d15189b82eb90becc34e2aebde926ab18eb8727d