Analysis
-
max time kernel
125s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 16:42
Behavioral task
behavioral1
Sample
Client-built2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Client-built2.exe
Resource
win11-20241007-en
General
-
Target
Client-built2.exe
-
Size
3.1MB
-
MD5
1bd62b73641d08b58d05ddc88a21f528
-
SHA1
db8afa72ff4b8ae9493555841cadcbd764037c96
-
SHA256
ad7d21da6daf2dc93d762a7b415d21d3d996928a24c0e5817e482414571091d3
-
SHA512
dea5f626c1f4af902b7f1c17dfc14e179ba4f8865054697cdbd39eabd9bbdbb9ab75cba957406332c6b13466cb3167a457ac2d9c00eaa3fd3028e5169b4177de
-
SSDEEP
49152:7v4go2QSaNpzyPllgamb0CZof/J/Cc3rmz2xoGdTTHHB72eh2NT:7vpo2QSaNpzyPllgamYCZof/JKc3Z
Malware Config
Extracted
quasar
1.4.1
something cool
waste-allergy-insured-branches.trycloudflare.com:4782
waste-allergy-insured-branches.trycloudflare.com:53242
182d06ff-972f-4a96-b344-59a01694d374
-
encryption_key
C5904FDD788EA00F921C538B9FE80C0B0A0DE728
-
install_name
MinecraftUpdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MinecraftUpdater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/2716-1-0x0000000000580000-0x00000000008A4000-memory.dmp family_quasar behavioral1/files/0x000300000001e5b2-8.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1108 MinecraftUpdater.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2372 schtasks.exe 2840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2716 Client-built2.exe Token: SeDebugPrivilege 1108 MinecraftUpdater.exe Token: SeDebugPrivilege 1864 taskmgr.exe Token: SeSystemProfilePrivilege 1864 taskmgr.exe Token: SeCreateGlobalPrivilege 1864 taskmgr.exe Token: 33 1864 taskmgr.exe Token: SeIncBasePriorityPrivilege 1864 taskmgr.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe -
Suspicious use of SendNotifyMessage 41 IoCs
pid Process 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe 1864 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1108 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2372 2716 Client-built2.exe 85 PID 2716 wrote to memory of 2372 2716 Client-built2.exe 85 PID 2716 wrote to memory of 1108 2716 Client-built2.exe 87 PID 2716 wrote to memory of 1108 2716 Client-built2.exe 87 PID 1108 wrote to memory of 2840 1108 MinecraftUpdater.exe 88 PID 1108 wrote to memory of 2840 1108 MinecraftUpdater.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built2.exe"C:\Users\Admin\AppData\Local\Temp\Client-built2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2372
-
-
C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD51bd62b73641d08b58d05ddc88a21f528
SHA1db8afa72ff4b8ae9493555841cadcbd764037c96
SHA256ad7d21da6daf2dc93d762a7b415d21d3d996928a24c0e5817e482414571091d3
SHA512dea5f626c1f4af902b7f1c17dfc14e179ba4f8865054697cdbd39eabd9bbdbb9ab75cba957406332c6b13466cb3167a457ac2d9c00eaa3fd3028e5169b4177de