Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2025, 05:01

General

  • Target

    5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe

  • Size

    3.2MB

  • MD5

    189a348006367f0532cafbced6f4f7a0

  • SHA1

    334fe5ea524c5a8e51ba8cb0ade6d894c9c8f94c

  • SHA256

    5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641

  • SHA512

    679706cf963b7ed251e61dc8d26b2fea1016ec72cf2596a4852c85d1ad5d4b8e43bd2d761f192e72cc5e5e39ecb6ce666366bdf2a0927f93186317ddc3bdca80

  • SSDEEP

    49152:tivht62XlaSFNWPjljiFa2RoUYI4CZ1J5LoGdQPTHHB72eh2NTi:MvL62XlaSFNWPjljiFXRoUYI4CT4

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

4.tcp.us-cal-1.ngrok.io:18092

Mutex

11bbf22e-826e-486b-b024-adbd86228a9e

Attributes
  • encryption_key

    7A589EDBC6A581E125BF830EF0D05FC74BB75E30

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    ctfmon

  • subdirectory

    SubDir

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 4 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe
    "C:\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2340
    • \??\c:\users\admin\appdata\local\temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 
      c:\users\admin\appdata\local\temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1664
      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1372
        • \??\c:\users\admin\appdata\roaming\subdir\client.exe 
          c:\users\admin\appdata\roaming\subdir\client.exe 
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:776
        • C:\Windows\Resources\Themes\icsys.icn.exe
          C:\Windows\Resources\Themes\icsys.icn.exe
          4⤵
            PID:1916
      • C:\Windows\Resources\Themes\icsys.icn.exe
        C:\Windows\Resources\Themes\icsys.icn.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2268
        • \??\c:\windows\resources\themes\explorer.exe
          c:\windows\resources\themes\explorer.exe
          3⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2756
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe SE
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2308
            • \??\c:\windows\resources\svchost.exe
              c:\windows\resources\svchost.exe
              5⤵
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2796
              • \??\c:\windows\resources\spoolsv.exe
                c:\windows\resources\spoolsv.exe PR
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2568
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:03 /f
                6⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:2860
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:04 /f
                6⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:556
          • C:\Windows\Explorer.exe
            C:\Windows\Explorer.exe
            4⤵
              PID:640

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        3.2MB

        MD5

        189a348006367f0532cafbced6f4f7a0

        SHA1

        334fe5ea524c5a8e51ba8cb0ade6d894c9c8f94c

        SHA256

        5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641

        SHA512

        679706cf963b7ed251e61dc8d26b2fea1016ec72cf2596a4852c85d1ad5d4b8e43bd2d761f192e72cc5e5e39ecb6ce666366bdf2a0927f93186317ddc3bdca80

      • C:\Windows\Resources\Themes\explorer.exe

        Filesize

        135KB

        MD5

        ab00e119e81e07ac502834f62bc00bbc

        SHA1

        24a8e62358379e71f0ec53c67a783d107784d390

        SHA256

        5b3748bfca201acc6c5824222661c9a8f73501d2af5091b8c4f16423b476a5da

        SHA512

        eccf362ff37fa2dff85da8e6447ac950c102bd3d09e332c0b4b3e2d88b5bb018b99f0fc4665c96f4556fbd35aa63c34d352c1efdb937866b150b64198f2ef6cc

      • C:\Windows\Resources\Themes\icsys.icn.exe

        Filesize

        135KB

        MD5

        75103a2b5a70d0c7b2dac8af8ec0f936

        SHA1

        1a4f760cac0f1ab3be43a161d8f01e17c7233e54

        SHA256

        2ccbbe3621e201a7ad027003271adced99a6349ad0aac5cad8027319ced8e59e

        SHA512

        8a39542db0f5c031d69d2999f1b2d235dc468a38682b161e5e9fce3fbbd3ce50b5c63a182a3656c30d3ffaa6678658663355234ef8d6b58bd9c0d3f1c7f4418e

      • C:\Windows\Resources\svchost.exe

        Filesize

        135KB

        MD5

        07a50a83048285452fede28659cf0dc2

        SHA1

        a6e7cbf8fbddd08dddd7f2ff9a067b0a81bb1eda

        SHA256

        83f30aad877c82fd6a4c96d506f98c2d2fe567f7dc1b06cbaaf33abca2b80cf2

        SHA512

        722b7d7a535017b4e329d11098726f61836e6cf5be1cb87dcdb30fbdecf7f05a9a4be5ae7eaa90fdfa7064262bb09253fd1a6c767fd67336bb24f0aa7b23e428

      • \Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 

        Filesize

        3.1MB

        MD5

        942d7d99678d584c4481278378741d51

        SHA1

        97efb624cfa34da0c5583e61a5982fd496de8e2d

        SHA256

        4119dedd1d6408f80505394a374cde76124a736913f958c878f54c16c98986e3

        SHA512

        0c1798628d5c90eaa6cf54277ab917408b5921e4f39ece0505510d9b7241df6748a365bc2a0a1cdaa24771f4ac56a9973a6515a0e32a14a66a9ed98c2871dfba

      • \Windows\Resources\spoolsv.exe

        Filesize

        135KB

        MD5

        2267463b6598465742895e5600ada5e2

        SHA1

        f4a11a40de4ab4e6d5c89ffe27e19b8df28f9b30

        SHA256

        713cd146b309f11c8e5ea0118616fa6e1a4c8658d430b02d5d161b25fd3bfc8b

        SHA512

        e2133190a324e55192dfd2d6b0e82605f9d41877dde26c1b547281168b6731d05a711649b1d3cad5c19f7193bef17cdf1507c2882c6695a9dd68a39804e8f3b1

      • memory/776-81-0x00000000009A0000-0x0000000000CC4000-memory.dmp

        Filesize

        3.1MB

      • memory/1372-82-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2200-12-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2200-11-0x0000000000C60000-0x0000000000F84000-memory.dmp

        Filesize

        3.1MB

      • memory/2200-10-0x000007FEF5E03000-0x000007FEF5E04000-memory.dmp

        Filesize

        4KB

      • memory/2200-68-0x000007FEF5E00000-0x000007FEF67EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2268-29-0x00000000003A0000-0x00000000003BF000-memory.dmp

        Filesize

        124KB

      • memory/2268-76-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2308-74-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2308-62-0x0000000000520000-0x000000000053F000-memory.dmp

        Filesize

        124KB

      • memory/2340-16-0x0000000000300000-0x000000000031F000-memory.dmp

        Filesize

        124KB

      • memory/2340-75-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2340-0-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2568-73-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2568-70-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2756-84-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2796-69-0x0000000000270000-0x000000000028F000-memory.dmp

        Filesize

        124KB

      • memory/2796-63-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2796-85-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2796-86-0x0000000000270000-0x000000000028F000-memory.dmp

        Filesize

        124KB