Analysis
-
max time kernel
27s -
max time network
26s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-01-2025 04:49
Behavioral task
behavioral1
Sample
Windows-Activation.zip
Resource
win11-20241007-en
General
-
Target
Windows-Activation.zip
-
Size
1.1MB
-
MD5
a95f11ca5a79851b841d4067575157b5
-
SHA1
38e9c2468ca0dff7d8a29326e8b3f088d53cd8c1
-
SHA256
84ccda8f5546361630314c5d7be711813e47a8c9f228f8be898691af5cdb9c6d
-
SHA512
b0361fe666150041221f87bf350e7b7302ecc948e20ef04930c689e60213c992ac0f739705aa9648a3a04b092385fadee4ac4aa4c708f41678bf25be7e7a11a3
-
SSDEEP
24576:HUY21azKI3AQUwlibre9F7x17QtC+UqRurDQwIjbkq/DiC43JgHCD362:tZXb0C+Uiur0LaPgO62
Malware Config
Extracted
quasar
1.4.1
Svchost.exe
192.168.1.190:4782
75ec4d04-9201-465b-9d52-07fbf8901610
-
encryption_key
BC9F0EB6E1FA6B8559DDF8DE0AEF08110EBCF8E5
-
install_name
Svchostt.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Svchostt.exe
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x001d00000002abe8-3.dat family_quasar behavioral1/memory/4736-5-0x0000000000510000-0x0000000000834000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 4736 Windows-Activation.exe 2804 Svchostt.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\Svchostt.exe Windows-Activation.exe File opened for modification C:\Windows\system32\Svchostt.exe Windows-Activation.exe File opened for modification C:\Windows\system32\Svchostt.exe Svchostt.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2072 schtasks.exe 1880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 4144 7zFM.exe Token: 35 4144 7zFM.exe Token: SeSecurityPrivilege 4144 7zFM.exe Token: SeDebugPrivilege 4736 Windows-Activation.exe Token: SeDebugPrivilege 2804 Svchostt.exe Token: SeDebugPrivilege 4540 taskmgr.exe Token: SeSystemProfilePrivilege 4540 taskmgr.exe Token: SeCreateGlobalPrivilege 4540 taskmgr.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4144 7zFM.exe 4144 7zFM.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe 4540 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2804 Svchostt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2072 4736 Windows-Activation.exe 82 PID 4736 wrote to memory of 2072 4736 Windows-Activation.exe 82 PID 4736 wrote to memory of 2804 4736 Windows-Activation.exe 84 PID 4736 wrote to memory of 2804 4736 Windows-Activation.exe 84 PID 2804 wrote to memory of 1880 2804 Svchostt.exe 85 PID 2804 wrote to memory of 1880 2804 Svchostt.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Windows-Activation.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4144
-
C:\Users\Admin\Desktop\Windows-Activation.exe"C:\Users\Admin\Desktop\Windows-Activation.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Svchostt.exe" /sc ONLOGON /tr "C:\Windows\system32\Svchostt.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2072
-
-
C:\Windows\system32\Svchostt.exe"C:\Windows\system32\Svchostt.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Svchostt.exe" /sc ONLOGON /tr "C:\Windows\system32\Svchostt.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1880
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5d72fe1fd9a3b804f637f69d9729e513e
SHA1a3af8c93c8c4f9c06279379b080d3edbdc300355
SHA256353d1374c3f454effbabc1dfe13ce3a9bfeac31494a992df8e9e43fc1c36b3d9
SHA51204e3397e77dfb5c72206248cc218dc908afdf03af9e4e2617f20e7a44429bfa63b22a6a49b7391d4da0e950daf62aceb241222a3c57f713208858cc2b5141d86
-
Filesize
3.1MB
MD5ae747de0584eeab55957aa8ec12ba488
SHA141483b8e1ff488a546e08de74ac09300fe63c80b
SHA256300bad38953dd87cda952bb60f1999a5ea1f9c0f64a3f0f842633b982b15194b
SHA512f744156f05ebe0adbbe0e3973783e60e0d2b98ea8c33a147f0e1afe1cdd749b994453b7da4f8c45c73af0569453f85dacddde57820aa1f9a94e3f7350445b68c