Analysis
-
max time kernel
65s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/01/2025, 15:27
Behavioral task
behavioral1
Sample
Updater.exe
Resource
win7-20241010-en
General
-
Target
Updater.exe
-
Size
3.2MB
-
MD5
bde27400071e8114a50e49c7a7d5aca3
-
SHA1
e8ba2d9c033467c5b9bc68f3646da6d24ab18bec
-
SHA256
cf69d61f1cba5ad3feb85ba91931d37ae5862eb2a7d5d9f5ab10b8817139cdcc
-
SHA512
13be08ea18cc1859f5bcc2f8346d1772e232ab9380a80e20116183f880fc21999b520e91c1206faffbbd60111b12567e99ed4807d219d409f9848cd7c5596cbf
-
SSDEEP
49152:zvTI22SsaNYfdPBldt698dBcjH01xY1v4LoG2Y8THHB72eh2NT:zvs22SsaNYfdPBldt6+dBcjH01xj
Malware Config
Extracted
quasar
1.4.1
Office04
nukedrust-59850.portmap.host:59850
e18b24bb-41a4-4371-91a7-7a5c163c4d80
-
encryption_key
D1BE981B0A025276CA1B60203BDCB46D48C43278
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update.exe
-
subdirectory
modules
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1680-1-0x0000000000C70000-0x0000000000FB0000-memory.dmp family_quasar -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\modules\svchost.exe Updater.exe File opened for modification C:\Windows\system32\modules\svchost.exe Updater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2932 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 Updater.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2932 1680 Updater.exe 30 PID 1680 wrote to memory of 2932 1680 Updater.exe 30 PID 1680 wrote to memory of 2932 1680 Updater.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Updater.exe"C:\Users\Admin\AppData\Local\Temp\Updater.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Windows\system32\modules\svchost.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2932
-