Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-12-2024 18:27
Behavioral task
behavioral1
Sample
j.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
j.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
j.exe
Resource
win11-20241007-en
General
-
Target
j.exe
-
Size
3.1MB
-
MD5
e0bb76d13de0c501243d320c86f279b2
-
SHA1
d8560283584c4ef6e86dcdb13edb6f5c57122c15
-
SHA256
667cb53091bf9a62035df268e681af5be5c10cdc77d05c546d27aac3684a1a1d
-
SHA512
a15d6a19b19ba8a335aff5b6a8e97af84658d52b16d74cf6a26662eff0cf0736b8cef64ae10dc0b2f09cc590fde79a9e01d885dee626047516d088fc47bb5ca3
-
SSDEEP
49152:fv9z92YpaQI6oPZlhP3ReybewozSRJ6ubR3LoGdcTHHB72eh2NT:fvV92YpaQI6oPZlhP3YybewozSRJ6o
Malware Config
Extracted
quasar
1.4.1
something cool
aahahaha123122-40548.portmap.host:40548
aahahaha123122-40548.portmap.host:4782
182d06ff-972f-4a96-b344-59a01694d374
-
encryption_key
C5904FDD788EA00F921C538B9FE80C0B0A0DE728
-
install_name
MinecraftUpdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MinecraftUpdater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral3/memory/2352-1-0x0000000000100000-0x0000000000424000-memory.dmp family_quasar behavioral3/files/0x001e00000002ab03-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2468 MinecraftUpdater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe 3156 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 j.exe Token: SeDebugPrivilege 2468 MinecraftUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2468 MinecraftUpdater.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3156 2352 j.exe 78 PID 2352 wrote to memory of 3156 2352 j.exe 78 PID 2352 wrote to memory of 2468 2352 j.exe 80 PID 2352 wrote to memory of 2468 2352 j.exe 80 PID 2468 wrote to memory of 4828 2468 MinecraftUpdater.exe 81 PID 2468 wrote to memory of 4828 2468 MinecraftUpdater.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\j.exe"C:\Users\Admin\AppData\Local\Temp\j.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3156
-
-
C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MinecraftUpdater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MinecraftUpdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e0bb76d13de0c501243d320c86f279b2
SHA1d8560283584c4ef6e86dcdb13edb6f5c57122c15
SHA256667cb53091bf9a62035df268e681af5be5c10cdc77d05c546d27aac3684a1a1d
SHA512a15d6a19b19ba8a335aff5b6a8e97af84658d52b16d74cf6a26662eff0cf0736b8cef64ae10dc0b2f09cc590fde79a9e01d885dee626047516d088fc47bb5ca3