Analysis
-
max time kernel
29s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 09:01
Behavioral task
behavioral1
Sample
Seron.exe
Resource
win7-20240903-en
General
-
Target
Seron.exe
-
Size
3.1MB
-
MD5
cc69f02e1ef447e7fa8b720c8854f9fd
-
SHA1
f76a656e845e5e13b0cea87e46574d1445def0fa
-
SHA256
45523a903ee180f9e3951b007ca8bba84783f0bd986c2a1a351255e47d7e77a3
-
SHA512
230cc521b8b8a287542186cf681b810835bd2d380fd4c19ac4ee316145d6ba9a7460065dc428d486b26d6baa8df54a97f4c10519e5dc8091a0309ed2ea2f4d7b
-
SSDEEP
49152:nvelL26AaNeWgPhlmVqvMQ7XSKyKRJ60bR3LoGdoJATHHB72eh2NT:nvOL26AaNeWgPhlmVqkQ7XSKyKRJ6+M
Malware Config
Extracted
quasar
1.4.1
Seron
a4hrb4kc9z-59858.portmap.host:59858
2ac9af47-8868-455d-8ff0-aea73f3bb28f
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
i8zbCLcf2xHsS2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
i8zbCLcf2xHsS2
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1640-1-0x0000000001190000-0x00000000014B4000-memory.dmp family_quasar behavioral1/files/0x0009000000016cd3-6.dat family_quasar behavioral1/memory/1648-10-0x0000000000070000-0x0000000000394000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1648 i8zbCLcf2xHsS2.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2120 schtasks.exe 1212 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1640 Seron.exe Token: SeDebugPrivilege 1648 i8zbCLcf2xHsS2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1648 i8zbCLcf2xHsS2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2120 1640 Seron.exe 28 PID 1640 wrote to memory of 2120 1640 Seron.exe 28 PID 1640 wrote to memory of 2120 1640 Seron.exe 28 PID 1640 wrote to memory of 1648 1640 Seron.exe 30 PID 1640 wrote to memory of 1648 1640 Seron.exe 30 PID 1640 wrote to memory of 1648 1640 Seron.exe 30 PID 1648 wrote to memory of 1212 1648 i8zbCLcf2xHsS2.exe 31 PID 1648 wrote to memory of 1212 1648 i8zbCLcf2xHsS2.exe 31 PID 1648 wrote to memory of 1212 1648 i8zbCLcf2xHsS2.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Seron.exe"C:\Users\Admin\AppData\Local\Temp\Seron.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "i8zbCLcf2xHsS2" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\i8zbCLcf2xHsS2.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2120
-
-
C:\Users\Admin\AppData\Roaming\SubDir\i8zbCLcf2xHsS2.exe"C:\Users\Admin\AppData\Roaming\SubDir\i8zbCLcf2xHsS2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "i8zbCLcf2xHsS2" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\i8zbCLcf2xHsS2.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5cc69f02e1ef447e7fa8b720c8854f9fd
SHA1f76a656e845e5e13b0cea87e46574d1445def0fa
SHA25645523a903ee180f9e3951b007ca8bba84783f0bd986c2a1a351255e47d7e77a3
SHA512230cc521b8b8a287542186cf681b810835bd2d380fd4c19ac4ee316145d6ba9a7460065dc428d486b26d6baa8df54a97f4c10519e5dc8091a0309ed2ea2f4d7b