Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 18:45
Behavioral task
behavioral1
Sample
6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe
Resource
win10v2004-20241007-en
General
-
Target
6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe
-
Size
375KB
-
MD5
85b43fd8aa9d8b09b8613f2fa47c6bb0
-
SHA1
3729c0739c24b7ed9fda30684173a869c7398e80
-
SHA256
6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9
-
SHA512
2898dc0c44a6543136281cf0bbdc03c3cc958098366773fc31ab047c2819e9df3d2b5596ded0d9a2811d915d4ced0404494dfa3381572c56dda9bf2772706ef2
-
SSDEEP
6144:YbqQ4i1FFiEKZVSQZzs5jQKbgQ203StbjjSQkzaozVVqH:CpliPScgCy73StbjjSQkVzV0H
Malware Config
Extracted
quasar
1.3.0.0
Authenticator
iamaskibiditoilet-58299.portmap.host:58299
QSR_MUTEX_bNzknSVeSVx21JnqhQ
-
encryption_key
wAIAzlOLR0d5V3YI1aCM
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1928-1-0x0000000000C30000-0x0000000000C94000-memory.dmp family_quasar behavioral1/files/0x0008000000018741-5.dat family_quasar behavioral1/memory/2692-10-0x0000000000FA0000-0x0000000001004000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 2692 Runtime Broker.exe 1672 Runtime Broker.exe -
Loads dropped DLL 6 IoCs
pid Process 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2656 2692 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2644 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2644 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1300 schtasks.exe 2724 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe Token: SeDebugPrivilege 2692 Runtime Broker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 Runtime Broker.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1300 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 31 PID 1928 wrote to memory of 1300 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 31 PID 1928 wrote to memory of 1300 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 31 PID 1928 wrote to memory of 1300 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 31 PID 1928 wrote to memory of 2692 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 33 PID 1928 wrote to memory of 2692 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 33 PID 1928 wrote to memory of 2692 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 33 PID 1928 wrote to memory of 2692 1928 6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe 33 PID 2692 wrote to memory of 2724 2692 Runtime Broker.exe 34 PID 2692 wrote to memory of 2724 2692 Runtime Broker.exe 34 PID 2692 wrote to memory of 2724 2692 Runtime Broker.exe 34 PID 2692 wrote to memory of 2724 2692 Runtime Broker.exe 34 PID 2692 wrote to memory of 1400 2692 Runtime Broker.exe 36 PID 2692 wrote to memory of 1400 2692 Runtime Broker.exe 36 PID 2692 wrote to memory of 1400 2692 Runtime Broker.exe 36 PID 2692 wrote to memory of 1400 2692 Runtime Broker.exe 36 PID 2692 wrote to memory of 2656 2692 Runtime Broker.exe 38 PID 2692 wrote to memory of 2656 2692 Runtime Broker.exe 38 PID 2692 wrote to memory of 2656 2692 Runtime Broker.exe 38 PID 2692 wrote to memory of 2656 2692 Runtime Broker.exe 38 PID 1400 wrote to memory of 1668 1400 cmd.exe 39 PID 1400 wrote to memory of 1668 1400 cmd.exe 39 PID 1400 wrote to memory of 1668 1400 cmd.exe 39 PID 1400 wrote to memory of 1668 1400 cmd.exe 39 PID 1400 wrote to memory of 2644 1400 cmd.exe 40 PID 1400 wrote to memory of 2644 1400 cmd.exe 40 PID 1400 wrote to memory of 2644 1400 cmd.exe 40 PID 1400 wrote to memory of 2644 1400 cmd.exe 40 PID 1400 wrote to memory of 1672 1400 cmd.exe 42 PID 1400 wrote to memory of 1672 1400 cmd.exe 42 PID 1400 wrote to memory of 1672 1400 cmd.exe 42 PID 1400 wrote to memory of 1672 1400 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe"C:\Users\Admin\AppData\Local\Temp\6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\6eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9N.exe" /rl HIGHEST /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1300
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2724
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\hSNbNTiOe04B.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2644
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 14443⤵
- Loads dropped DLL
- Program crash
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD58f0dd1ec63aadd00f2ce5ddcf7e7f8d8
SHA14942de017eee73fcf20fac317078f34034a85a13
SHA2568ef05f5acf61f4e19375a8b2c013292ceac154567acbbf941bfbfabcbb6007bb
SHA512dbfb4655c2fa1d845e8f08e61378b097f82209f3c5df9d3304b78a43b8b5778cc535442fc2031dec15ac38816d183eefb4c1fb263d8a6c58d6ca10b132353840
-
Filesize
375KB
MD585b43fd8aa9d8b09b8613f2fa47c6bb0
SHA13729c0739c24b7ed9fda30684173a869c7398e80
SHA2566eea566794504979f9fa4d75285751f49afde178ad8a0cdfb81fceec9ebb2eb9
SHA5122898dc0c44a6543136281cf0bbdc03c3cc958098366773fc31ab047c2819e9df3d2b5596ded0d9a2811d915d4ced0404494dfa3381572c56dda9bf2772706ef2