Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/12/2024, 05:26
Behavioral task
behavioral1
Sample
Cryptor/Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Cryptor/Client-built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Cryptor/Cryptor.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Cryptor/Cryptor.exe
Resource
win10v2004-20241007-en
General
-
Target
Cryptor/Client-built.exe
-
Size
3.1MB
-
MD5
ffde80003bb39e45f92460a84b343771
-
SHA1
1ada86e287115526fc12d74865de3ca0c59c8c08
-
SHA256
e057b678ff3bca92b8672af195249608bcb56cfd01c1980d14b7c3e4d6952c8b
-
SHA512
4ae9adb21f511b1d114d5258d24d5b138a387149c593ed0743ad644ddb9461a248919ed305dbaae6b9beed9ed4525f8ad23a653c4b6507e7a021ea05a35961b4
-
SSDEEP
49152:uvRt62XlaSFNWPjljiFa2RoUYI9yL37ar1LoGdZ+47UTHHB72eh2NT:uvb62XlaSFNWPjljiFXRoUYIA3O
Malware Config
Extracted
quasar
1.4.1
Office04
127.0.0.1:4782
b8be2b57-3322-4df8-967c-65aedf2d425d
-
encryption_key
5871F8D84AF9E4D8F5ABACF2A5DD66E256B5A672
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1204-1-0x0000000000920000-0x0000000000C44000-memory.dmp family_quasar behavioral1/files/0x0007000000016cab-5.dat family_quasar behavioral1/memory/2700-8-0x0000000000D40000-0x0000000001064000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2700 Client.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\SubDir\Client.exe Client-built.exe File opened for modification C:\Program Files\SubDir\Client.exe Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe 2776 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1204 Client-built.exe Token: SeDebugPrivilege 2700 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2700 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2800 1204 Client-built.exe 30 PID 1204 wrote to memory of 2800 1204 Client-built.exe 30 PID 1204 wrote to memory of 2800 1204 Client-built.exe 30 PID 1204 wrote to memory of 2700 1204 Client-built.exe 32 PID 1204 wrote to memory of 2700 1204 Client-built.exe 32 PID 1204 wrote to memory of 2700 1204 Client-built.exe 32 PID 2700 wrote to memory of 2776 2700 Client.exe 33 PID 2700 wrote to memory of 2776 2700 Client.exe 33 PID 2700 wrote to memory of 2776 2700 Client.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cryptor\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Cryptor\Client-built.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2800
-
-
C:\Program Files\SubDir\Client.exe"C:\Program Files\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Program Files\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5ffde80003bb39e45f92460a84b343771
SHA11ada86e287115526fc12d74865de3ca0c59c8c08
SHA256e057b678ff3bca92b8672af195249608bcb56cfd01c1980d14b7c3e4d6952c8b
SHA5124ae9adb21f511b1d114d5258d24d5b138a387149c593ed0743ad644ddb9461a248919ed305dbaae6b9beed9ed4525f8ad23a653c4b6507e7a021ea05a35961b4