Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-12-2024 18:27
Behavioral task
behavioral1
Sample
j.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
j.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
j.exe
Resource
win11-20241007-en
General
-
Target
j.exe
-
Size
3.1MB
-
MD5
e0bb76d13de0c501243d320c86f279b2
-
SHA1
d8560283584c4ef6e86dcdb13edb6f5c57122c15
-
SHA256
667cb53091bf9a62035df268e681af5be5c10cdc77d05c546d27aac3684a1a1d
-
SHA512
a15d6a19b19ba8a335aff5b6a8e97af84658d52b16d74cf6a26662eff0cf0736b8cef64ae10dc0b2f09cc590fde79a9e01d885dee626047516d088fc47bb5ca3
-
SSDEEP
49152:fv9z92YpaQI6oPZlhP3ReybewozSRJ6ubR3LoGdcTHHB72eh2NT:fvV92YpaQI6oPZlhP3YybewozSRJ6o
Malware Config
Extracted
quasar
1.4.1
something cool
aahahaha123122-40548.portmap.host:40548
aahahaha123122-40548.portmap.host:4782
182d06ff-972f-4a96-b344-59a01694d374
-
encryption_key
C5904FDD788EA00F921C538B9FE80C0B0A0DE728
-
install_name
MinecraftUpdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MinecraftUpdater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/1160-1-0x0000000000360000-0x0000000000684000-memory.dmp family_quasar behavioral2/files/0x0028000000046180-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1028 MinecraftUpdater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3472 schtasks.exe 1928 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1160 j.exe Token: SeDebugPrivilege 1028 MinecraftUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1028 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1928 1160 j.exe 84 PID 1160 wrote to memory of 1928 1160 j.exe 84 PID 1160 wrote to memory of 1028 1160 j.exe 86 PID 1160 wrote to memory of 1028 1160 j.exe 86 PID 1028 wrote to memory of 3472 1028 MinecraftUpdater.exe 87 PID 1028 wrote to memory of 3472 1028 MinecraftUpdater.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\j.exe"C:\Users\Admin\AppData\Local\Temp\j.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1928
-
-
C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e0bb76d13de0c501243d320c86f279b2
SHA1d8560283584c4ef6e86dcdb13edb6f5c57122c15
SHA256667cb53091bf9a62035df268e681af5be5c10cdc77d05c546d27aac3684a1a1d
SHA512a15d6a19b19ba8a335aff5b6a8e97af84658d52b16d74cf6a26662eff0cf0736b8cef64ae10dc0b2f09cc590fde79a9e01d885dee626047516d088fc47bb5ca3