Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
SeronObf.exe
Resource
win7-20241010-en
General
-
Target
SeronObf.exe
-
Size
3.1MB
-
MD5
44177e3bdbc790c06a268a02dced77c4
-
SHA1
13578ac3ea2bb995f6f846a27ca82de1b3186db7
-
SHA256
7f3c5bf53129adfeb789c38f8dabda4b997545ad6a92d85cd1cb43a47e4417b2
-
SHA512
790e3ad20b45c6233453b9ca00e4939e6c6dcf966d276c66843ce5dbf60400cfb4df77933d77de97f2aab3d40c5a4c5a6fdc2af36ae2cac2af67789589021bc7
-
SSDEEP
98304:kIDq/kB9hLn7+YOBqJaQbmOsAdcpLrQVv3N:TDvZLn7+YOsMQbBQrm
Malware Config
Extracted
quasar
1.4.1
Seron
nigeboc465-58875.portmap.host:58875
eb8602ec-8a0d-4322-b9a0-544571be5a2d
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
f8mk7ZGwVUpulm.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
f8mk7ZGwVUpulm
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3904-11-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1052 f8mk7ZGwVUpulm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3164 set thread context of 3904 3164 SeronObf.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8mk7ZGwVUpulm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SeronObf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3244 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3904 RegAsm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3164 wrote to memory of 3904 3164 SeronObf.exe 99 PID 3904 wrote to memory of 3244 3904 RegAsm.exe 100 PID 3904 wrote to memory of 3244 3904 RegAsm.exe 100 PID 3904 wrote to memory of 3244 3904 RegAsm.exe 100 PID 3904 wrote to memory of 1052 3904 RegAsm.exe 102 PID 3904 wrote to memory of 1052 3904 RegAsm.exe 102 PID 3904 wrote to memory of 1052 3904 RegAsm.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\SeronObf.exe"C:\Users\Admin\AppData\Local\Temp\SeronObf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "f8mk7ZGwVUpulm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3244
-
-
C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe"C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2