Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2025, 15:27
Behavioral task
behavioral1
Sample
Updater.exe
Resource
win7-20241010-en
General
-
Target
Updater.exe
-
Size
3.2MB
-
MD5
bde27400071e8114a50e49c7a7d5aca3
-
SHA1
e8ba2d9c033467c5b9bc68f3646da6d24ab18bec
-
SHA256
cf69d61f1cba5ad3feb85ba91931d37ae5862eb2a7d5d9f5ab10b8817139cdcc
-
SHA512
13be08ea18cc1859f5bcc2f8346d1772e232ab9380a80e20116183f880fc21999b520e91c1206faffbbd60111b12567e99ed4807d219d409f9848cd7c5596cbf
-
SSDEEP
49152:zvTI22SsaNYfdPBldt698dBcjH01xY1v4LoG2Y8THHB72eh2NT:zvs22SsaNYfdPBldt6+dBcjH01xj
Malware Config
Extracted
quasar
1.4.1
Office04
nukedrust-59850.portmap.host:59850
e18b24bb-41a4-4371-91a7-7a5c163c4d80
-
encryption_key
D1BE981B0A025276CA1B60203BDCB46D48C43278
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update.exe
-
subdirectory
modules
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/3060-1-0x0000000000B70000-0x0000000000EB0000-memory.dmp family_quasar behavioral2/files/0x000400000001e4e1-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2900 svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\modules\svchost.exe Updater.exe File opened for modification C:\Windows\system32\modules Updater.exe File opened for modification C:\Windows\system32\modules\svchost.exe svchost.exe File opened for modification C:\Windows\system32\modules svchost.exe File created C:\Windows\system32\modules\svchost.exe Updater.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2764 schtasks.exe 1376 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3060 Updater.exe Token: SeDebugPrivilege 2900 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1376 3060 Updater.exe 85 PID 3060 wrote to memory of 1376 3060 Updater.exe 85 PID 3060 wrote to memory of 2900 3060 Updater.exe 87 PID 3060 wrote to memory of 2900 3060 Updater.exe 87 PID 2900 wrote to memory of 2764 2900 svchost.exe 88 PID 2900 wrote to memory of 2764 2900 svchost.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Updater.exe"C:\Users\Admin\AppData\Local\Temp\Updater.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Windows\system32\modules\svchost.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1376
-
-
C:\Windows\system32\modules\svchost.exe"C:\Windows\system32\modules\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Windows\system32\modules\svchost.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5bde27400071e8114a50e49c7a7d5aca3
SHA1e8ba2d9c033467c5b9bc68f3646da6d24ab18bec
SHA256cf69d61f1cba5ad3feb85ba91931d37ae5862eb2a7d5d9f5ab10b8817139cdcc
SHA51213be08ea18cc1859f5bcc2f8346d1772e232ab9380a80e20116183f880fc21999b520e91c1206faffbbd60111b12567e99ed4807d219d409f9848cd7c5596cbf