Resubmissions
09/01/2025, 16:12
250109-tnzlwawmel 1009/01/2025, 16:08
250109-tlcpbswlhj 1009/01/2025, 16:04
250109-th4zeawldl 10Analysis
-
max time kernel
208s -
max time network
209s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09/01/2025, 16:08
Behavioral task
behavioral1
Sample
ddnstest.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ddnstest.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ddnstest.exe
Resource
win10ltsc2021-20241211-en
Errors
General
-
Target
ddnstest.exe
-
Size
3.1MB
-
MD5
0b301a943083061bb0e95c688ad02dcf
-
SHA1
b26d04fcad24a618a422ae156774218d42538d88
-
SHA256
79b2e8bd0d46901502869063962252c0b80b77ff909f1e497bf4c04ae2f0ec71
-
SHA512
58e8fa3c6dd985d89fa2cd6a6f91ce87929165cee9d85b0fb1cbb70cfb33053567a333464da804ee7cee80f33bb5b065de4817812b114b9c7dbe5ef60e6ab923
-
SSDEEP
49152:avyI22SsaNYfdPBldt698dBcjHF2tjmzeEoGdzTHHB72eh2NT:avf22SsaNYfdPBldt6+dBcjHF2te
Malware Config
Extracted
quasar
1.4.1
Office04
hiimbob.ddnsking.com:9112
91f1b164-f669-47a1-b3ec-59976d66b33a
-
encryption_key
FD9ED3A6AE6574CE5C854385C6AC2FC432580344
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral3/memory/2628-1-0x0000000000B00000-0x0000000000E24000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000\Control Panel\International\Geo\Nation ddnstest.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4040 netsh.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1764 ipconfig.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "174" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2628 ddnstest.exe Token: SeDebugPrivilege 1796 whoami.exe Token: SeShutdownPrivilege 3808 shutdown.exe Token: SeRemoteShutdownPrivilege 3808 shutdown.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2628 ddnstest.exe 2628 ddnstest.exe 2628 ddnstest.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2628 ddnstest.exe 2628 ddnstest.exe 2628 ddnstest.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2628 ddnstest.exe 1896 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2628 wrote to memory of 4912 2628 ddnstest.exe 91 PID 2628 wrote to memory of 4912 2628 ddnstest.exe 91 PID 4912 wrote to memory of 2616 4912 cmd.exe 93 PID 4912 wrote to memory of 2616 4912 cmd.exe 93 PID 4912 wrote to memory of 1764 4912 cmd.exe 94 PID 4912 wrote to memory of 1764 4912 cmd.exe 94 PID 4912 wrote to memory of 4040 4912 cmd.exe 95 PID 4912 wrote to memory of 4040 4912 cmd.exe 95 PID 4912 wrote to memory of 1796 4912 cmd.exe 96 PID 4912 wrote to memory of 1796 4912 cmd.exe 96 PID 2628 wrote to memory of 3808 2628 ddnstest.exe 97 PID 2628 wrote to memory of 3808 2628 ddnstest.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddnstest.exe"C:\Users\Admin\AppData\Local\Temp\ddnstest.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /K CHCP 4372⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\chcp.comCHCP 4373⤵PID:2616
-
-
C:\Windows\system32\ipconfig.exeipconfig3⤵
- Gathers network information
PID:1764
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4040
-
-
C:\Windows\system32\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a1a855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1896