Analysis
-
max time kernel
5s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 09:21
Behavioral task
behavioral1
Sample
OneDrive.exe
Resource
win7-20240903-en
General
-
Target
OneDrive.exe
-
Size
3.1MB
-
MD5
12bcc06c6099dfa56cce7a20fda7c8ab
-
SHA1
3b5e6d75d161b21e5a89602c509832d0a416eaf2
-
SHA256
cff0e57630d92a40cb239230dfb9d293b2406f91c8374fda5d4ff70b6c8310f6
-
SHA512
2d1ce86d47ba9ea2ebbcc3db2249c5374d90873ac5117464b50acc554b3936f910ab1f1f5745b7652a892e3090c12c52d56feaec4bd835264d033ed0a1a8ee89
-
SSDEEP
49152:ivxt62XlaSFNWPjljiFa2RoUYIcDxNESEYk/i8LoGd8JTHHB72eh2NT:iv762XlaSFNWPjljiFXRoUYI4xjC
Malware Config
Extracted
quasar
1.4.1
new
194.26.192.167:2768
67b58d78-e769-403e-bf6e-e83f8f31b2f5
-
encryption_key
BE2B0B270E4DB19CAA5C42E9D2EBF64645A2D055
-
install_name
OneDrive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
OneDrive
-
subdirectory
OneDrive
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1620-1-0x00000000002E0000-0x0000000000604000-memory.dmp family_quasar -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1144 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 OneDrive.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1620 OneDrive.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1144 1620 OneDrive.exe 30 PID 1620 wrote to memory of 1144 1620 OneDrive.exe 30 PID 1620 wrote to memory of 1144 1620 OneDrive.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1144
-