Overview
overview
10Static
static
10pass is 1/...ng.dll
windows7-x64
1pass is 1/...ng.dll
windows10-2004-x64
1pass is 1/...re.dll
windows7-x64
1pass is 1/...re.dll
windows10-2004-x64
1pass is 1/...ms.dll
windows7-x64
1pass is 1/...ms.dll
windows10-2004-x64
1pass is 1/...pf.dll
windows7-x64
1pass is 1/...pf.dll
windows10-2004-x64
1pass is 1/UI.dll
windows7-x64
5pass is 1/UI.dll
windows10-2004-x64
7pass is 1/awp 2.exe
windows7-x64
1pass is 1/awp 2.exe
windows10-2004-x64
1pass is 1/...t).exe
windows7-x64
10pass is 1/...t).exe
windows10-2004-x64
10Analysis
-
max time kernel
126s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 20:26
Behavioral task
behavioral1
Sample
pass is 1/Microsoft.Extensions.FileSystemGlobbing.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
pass is 1/Microsoft.Extensions.FileSystemGlobbing.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pass is 1/Microsoft.Web.WebView2.Core.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
pass is 1/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pass is 1/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
pass is 1/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
pass is 1/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
pass is 1/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
pass is 1/UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
pass is 1/UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
pass is 1/awp 2.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
pass is 1/awp 2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
pass is 1/driver (run to map it).exe
Resource
win7-20240903-en
General
-
Target
pass is 1/driver (run to map it).exe
-
Size
3.1MB
-
MD5
b854dc5efcf3779f9cc0db2161c4f5da
-
SHA1
3842b9fc6d342482bd674e52bdc536921e1f1a6a
-
SHA256
6fd1a64cabca8ccb61cacdc5b9c28726068987e23ba89c9ba387cb2bb8c4dee7
-
SHA512
7de23a24b160e35da92cfb903cbe92f3745bbc1bb5c13b81c0bfc08f7ac192a10ed2780f546425abd8dd8c3056172e8836bc35015453ff23dbd75b60f46cf418
-
SSDEEP
49152:mvQt62XlaSFNWPjljiFa2RoUYICCX1JuLoGdoCvTHHB72eh2NT:mvc62XlaSFNWPjljiFXRoUYICCI4
Malware Config
Extracted
quasar
1.4.1
AWP
re-drunk.gl.at.ply.gg:14309
220e3868-c992-4d03-83a8-2affbb617e80
-
encryption_key
6C0A2B10B7809180680C7DAF60E1C0D9CD0AF5ED
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
ui
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral13/memory/1992-1-0x0000000000930000-0x0000000000C54000-memory.dmp family_quasar behavioral13/files/0x00060000000173fb-5.dat family_quasar behavioral13/memory/772-8-0x0000000000EB0000-0x00000000011D4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 772 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2356 schtasks.exe 1164 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1992 driver (run to map it).exe Token: SeDebugPrivilege 772 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 772 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 772 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 772 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2356 1992 driver (run to map it).exe 30 PID 1992 wrote to memory of 2356 1992 driver (run to map it).exe 30 PID 1992 wrote to memory of 2356 1992 driver (run to map it).exe 30 PID 1992 wrote to memory of 772 1992 driver (run to map it).exe 32 PID 1992 wrote to memory of 772 1992 driver (run to map it).exe 32 PID 1992 wrote to memory of 772 1992 driver (run to map it).exe 32 PID 772 wrote to memory of 1164 772 Client.exe 33 PID 772 wrote to memory of 1164 772 Client.exe 33 PID 772 wrote to memory of 1164 772 Client.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\pass is 1\driver (run to map it).exe"C:\Users\Admin\AppData\Local\Temp\pass is 1\driver (run to map it).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ui\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2356
-
-
C:\Users\Admin\AppData\Roaming\ui\Client.exe"C:\Users\Admin\AppData\Roaming\ui\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ui\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5b854dc5efcf3779f9cc0db2161c4f5da
SHA13842b9fc6d342482bd674e52bdc536921e1f1a6a
SHA2566fd1a64cabca8ccb61cacdc5b9c28726068987e23ba89c9ba387cb2bb8c4dee7
SHA5127de23a24b160e35da92cfb903cbe92f3745bbc1bb5c13b81c0bfc08f7ac192a10ed2780f546425abd8dd8c3056172e8836bc35015453ff23dbd75b60f46cf418