Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-12-2024 19:14
Behavioral task
behavioral1
Sample
AAAHHHH.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
AAAHHHH.exe
Resource
win11-20241007-en
General
-
Target
AAAHHHH.exe
-
Size
3.1MB
-
MD5
6088aaa8d0ba77fe7649c56226fcf79e
-
SHA1
43f7ac7827c3c57ac58b6093757bcaa637db7698
-
SHA256
096f1692176785aa88872660aaefd08b995de5179f95947e3ab48e85158591af
-
SHA512
c2f36efe8e5039d4c48a773c14a6925becb5ca30aaaa1d5249a4e9cc36799680e32f018d03a9ed01904751a1d15189b82eb90becc34e2aebde926ab18eb8727d
-
SSDEEP
49152:ov55E2VFatysqPFlLC24fdxyG5NJXheUMfcioGdEDTHHB72eh2NT:ovHE2VFatysqPFlLC2IdxyG5NJXheV
Malware Config
Extracted
quasar
1.4.1
minecraft_updater
169.254.197.237:139
192.168.7.110:139
127.0.0.1:139
0.0.0.0:139
98.97.12.133:139
182d06ff-972f-4a96-b344-59a01694d374
-
encryption_key
C5904FDD788EA00F921C538B9FE80C0B0A0DE728
-
install_name
MinecraftUpdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MinecraftUpdater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/3740-1-0x0000000000D70000-0x0000000001094000-memory.dmp family_quasar behavioral2/files/0x001e00000002ab3e-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3904 MinecraftUpdater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1652 schtasks.exe 3696 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3740 AAAHHHH.exe Token: SeDebugPrivilege 3904 MinecraftUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3904 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3740 wrote to memory of 1652 3740 AAAHHHH.exe 78 PID 3740 wrote to memory of 1652 3740 AAAHHHH.exe 78 PID 3740 wrote to memory of 3904 3740 AAAHHHH.exe 80 PID 3740 wrote to memory of 3904 3740 AAAHHHH.exe 80 PID 3904 wrote to memory of 3696 3904 MinecraftUpdater.exe 81 PID 3904 wrote to memory of 3696 3904 MinecraftUpdater.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\AAAHHHH.exe"C:\Users\Admin\AppData\Local\Temp\AAAHHHH.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56088aaa8d0ba77fe7649c56226fcf79e
SHA143f7ac7827c3c57ac58b6093757bcaa637db7698
SHA256096f1692176785aa88872660aaefd08b995de5179f95947e3ab48e85158591af
SHA512c2f36efe8e5039d4c48a773c14a6925becb5ca30aaaa1d5249a4e9cc36799680e32f018d03a9ed01904751a1d15189b82eb90becc34e2aebde926ab18eb8727d