Overview
overview
10Static
static
10pass is 1/...ng.dll
windows7-x64
1pass is 1/...ng.dll
windows10-2004-x64
1pass is 1/...re.dll
windows7-x64
1pass is 1/...re.dll
windows10-2004-x64
1pass is 1/...ms.dll
windows7-x64
1pass is 1/...ms.dll
windows10-2004-x64
1pass is 1/...pf.dll
windows7-x64
1pass is 1/...pf.dll
windows10-2004-x64
1pass is 1/UI.dll
windows7-x64
5pass is 1/UI.dll
windows10-2004-x64
7pass is 1/awp 2.exe
windows7-x64
1pass is 1/awp 2.exe
windows10-2004-x64
1pass is 1/...t).exe
windows7-x64
10pass is 1/...t).exe
windows10-2004-x64
10Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 20:26
Behavioral task
behavioral1
Sample
pass is 1/Microsoft.Extensions.FileSystemGlobbing.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
pass is 1/Microsoft.Extensions.FileSystemGlobbing.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
pass is 1/Microsoft.Web.WebView2.Core.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
pass is 1/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pass is 1/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
pass is 1/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
pass is 1/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
pass is 1/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
pass is 1/UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
pass is 1/UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
pass is 1/awp 2.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
pass is 1/awp 2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
pass is 1/driver (run to map it).exe
Resource
win7-20240903-en
General
-
Target
pass is 1/driver (run to map it).exe
-
Size
3.1MB
-
MD5
b854dc5efcf3779f9cc0db2161c4f5da
-
SHA1
3842b9fc6d342482bd674e52bdc536921e1f1a6a
-
SHA256
6fd1a64cabca8ccb61cacdc5b9c28726068987e23ba89c9ba387cb2bb8c4dee7
-
SHA512
7de23a24b160e35da92cfb903cbe92f3745bbc1bb5c13b81c0bfc08f7ac192a10ed2780f546425abd8dd8c3056172e8836bc35015453ff23dbd75b60f46cf418
-
SSDEEP
49152:mvQt62XlaSFNWPjljiFa2RoUYICCX1JuLoGdoCvTHHB72eh2NT:mvc62XlaSFNWPjljiFXRoUYICCI4
Malware Config
Extracted
quasar
1.4.1
AWP
re-drunk.gl.at.ply.gg:14309
220e3868-c992-4d03-83a8-2affbb617e80
-
encryption_key
6C0A2B10B7809180680C7DAF60E1C0D9CD0AF5ED
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
ui
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral14/memory/1504-1-0x00000000006F0000-0x0000000000A14000-memory.dmp family_quasar behavioral14/files/0x000c000000023bb4-5.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1912 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4268 schtasks.exe 4448 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1504 driver (run to map it).exe Token: SeDebugPrivilege 1912 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1912 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1912 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1912 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1504 wrote to memory of 4268 1504 driver (run to map it).exe 82 PID 1504 wrote to memory of 4268 1504 driver (run to map it).exe 82 PID 1504 wrote to memory of 1912 1504 driver (run to map it).exe 84 PID 1504 wrote to memory of 1912 1504 driver (run to map it).exe 84 PID 1912 wrote to memory of 4448 1912 Client.exe 85 PID 1912 wrote to memory of 4448 1912 Client.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\pass is 1\driver (run to map it).exe"C:\Users\Admin\AppData\Local\Temp\pass is 1\driver (run to map it).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ui\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4268
-
-
C:\Users\Admin\AppData\Roaming\ui\Client.exe"C:\Users\Admin\AppData\Roaming\ui\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ui\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5b854dc5efcf3779f9cc0db2161c4f5da
SHA13842b9fc6d342482bd674e52bdc536921e1f1a6a
SHA2566fd1a64cabca8ccb61cacdc5b9c28726068987e23ba89c9ba387cb2bb8c4dee7
SHA5127de23a24b160e35da92cfb903cbe92f3745bbc1bb5c13b81c0bfc08f7ac192a10ed2780f546425abd8dd8c3056172e8836bc35015453ff23dbd75b60f46cf418