Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 11:22
Behavioral task
behavioral1
Sample
SeronTest.exe
Resource
win7-20240903-en
General
-
Target
SeronTest.exe
-
Size
3.1MB
-
MD5
c18003ca99f5096b2fe9447a5287b5ed
-
SHA1
10ebcb15ed1eb9def39fd6a9dfa4db8ef83e61ca
-
SHA256
ad5cb8a93739cfa25593297273376d7184e735ce1d373988cb179084b8bb6059
-
SHA512
6ebb5def09d76801243c45fbf83844b8d9ad7c27154cc289c88fed630f3b1952af4dea4febdde021cf0c3a9b3fbddaefe89f1fc5903b03e52768f570376f2aac
-
SSDEEP
49152:TvelL26AaNeWgPhlmVqvMQ7XSK3PxNESE+k/iuLoGdUTHHB72eh2NT:TvOL26AaNeWgPhlmVqkQ7XSKfxNQ
Malware Config
Extracted
quasar
1.4.1
Seron
nigeboc465-58875.portmap.host:58875
eb8602ec-8a0d-4322-b9a0-544571be5a2d
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
f8mk7ZGwVUpulm.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
f8mk7ZGwVUpulm
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/4152-1-0x0000000000BF0000-0x0000000000F14000-memory.dmp family_quasar behavioral2/files/0x000a000000023b71-5.dat family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation f8mk7ZGwVUpulm.exe -
Executes dropped EXE 1 IoCs
pid Process 3576 f8mk7ZGwVUpulm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4656 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4656 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5044 schtasks.exe 4568 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4152 SeronTest.exe Token: SeDebugPrivilege 3576 f8mk7ZGwVUpulm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3576 f8mk7ZGwVUpulm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4152 wrote to memory of 5044 4152 SeronTest.exe 83 PID 4152 wrote to memory of 5044 4152 SeronTest.exe 83 PID 4152 wrote to memory of 3576 4152 SeronTest.exe 85 PID 4152 wrote to memory of 3576 4152 SeronTest.exe 85 PID 3576 wrote to memory of 4568 3576 f8mk7ZGwVUpulm.exe 86 PID 3576 wrote to memory of 4568 3576 f8mk7ZGwVUpulm.exe 86 PID 3576 wrote to memory of 2728 3576 f8mk7ZGwVUpulm.exe 94 PID 3576 wrote to memory of 2728 3576 f8mk7ZGwVUpulm.exe 94 PID 3576 wrote to memory of 112 3576 f8mk7ZGwVUpulm.exe 96 PID 3576 wrote to memory of 112 3576 f8mk7ZGwVUpulm.exe 96 PID 112 wrote to memory of 1012 112 cmd.exe 98 PID 112 wrote to memory of 1012 112 cmd.exe 98 PID 112 wrote to memory of 4656 112 cmd.exe 99 PID 112 wrote to memory of 4656 112 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SeronTest.exe"C:\Users\Admin\AppData\Local\Temp\SeronTest.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "f8mk7ZGwVUpulm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:5044
-
-
C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe"C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "f8mk7ZGwVUpulm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4568
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /delete /tn "f8mk7ZGwVUpulm" /f3⤵PID:2728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LSIE3gWisC7N.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:1012
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD559e7399b34605e7123ca7ba3739bab56
SHA1b31b22e9bc589b9f5d4b3c6074e43492f3480f94
SHA2566c541cd5a43d39bb75f8ddae6d3b85477394bdc2bef79831aa6771f88d8c7a3b
SHA51234f8fc7c2828b110c63d32af91d55f7c66a4163f78f619b431ebca1b42f6c43b28cf0c173c8c5baf3ea8f86cb33370b68853130f32abcd625cf9872e7ea7250c
-
Filesize
3.1MB
MD5c18003ca99f5096b2fe9447a5287b5ed
SHA110ebcb15ed1eb9def39fd6a9dfa4db8ef83e61ca
SHA256ad5cb8a93739cfa25593297273376d7184e735ce1d373988cb179084b8bb6059
SHA5126ebb5def09d76801243c45fbf83844b8d9ad7c27154cc289c88fed630f3b1952af4dea4febdde021cf0c3a9b3fbddaefe89f1fc5903b03e52768f570376f2aac