Resubmissions

17-01-2025 15:11

250117-sk4kzssrhv 10

17-01-2025 15:09

250117-sjgd3asrbs 10

17-01-2025 15:07

250117-shlbmasqgv 10

17-01-2025 14:27

250117-rsndas1pgx 10

16-01-2025 17:37

250116-v7e71s1ncy 10

16-01-2025 17:30

250116-v27eba1lew 10

16-01-2025 17:29

250116-v232ws1let 3

16-01-2025 17:29

250116-v21lrs1ldz 3

16-01-2025 17:27

250116-v1g32a1qfk 10

16-01-2025 09:47

250116-lsajjsvrgn 10

Analysis

  • max time kernel
    60s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 12:40

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

104.251.123.245:23600

Mutex

4119a2e0-4ae4-4843-8534-99af91a2475d

Attributes
  • encryption_key

    DF6316067206E09C1F85138FCEBD56F5D94BF6AE

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Startup

  • subdirectory

    SubDir

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

127.0.0.1:443

Extracted

Family

quasar

Version

1.4.1

Botnet

RAT 5 (EPIC VERISON)

C2

serveo.net:11453

Mutex

7a1301f7-dc6f-4847-a8ee-ca627a9efa0f

Attributes
  • encryption_key

    3B793156AD6D884F51309D0E992DAA75D03D2783

  • install_name

    Application Frame Host.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft

  • subdirectory

    SubDir

Extracted

Family

asyncrat

Botnet

Default

C2

forums-appliances.gl.at.ply.gg:1962

Attributes
  • delay

    1

  • install

    true

  • install_file

    windows.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 6 IoCs
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
    "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Users\Admin\AppData\Local\Temp\Files\Money.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Money.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1416
      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\system32\schtasks.exe
          "schtasks" /create /tn "Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2300
    • C:\Users\Admin\AppData\Local\Temp\Files\script.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\script.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1952
    • C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Microsoft" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2348
      • C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Windows\system32\schtasks.exe
          "schtasks" /create /tn "Microsoft" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Application Frame Host.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2088
    • C:\Users\Admin\AppData\Local\Temp\Files\wmfdist.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\wmfdist.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1872
    • C:\Users\Admin\AppData\Local\Temp\Files\aidans.dont.run.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\aidans.dont.run.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows" /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1060
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "windows" /tr '"C:\Users\Admin\AppData\Roaming\windows.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1444
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp168.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1572
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1812
        • C:\Users\Admin\AppData\Roaming\windows.exe
          "C:\Users\Admin\AppData\Roaming\windows.exe"
          4⤵
          • Executes dropped EXE
          PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fb1937f07676d669a7835b233ed5cc3

    SHA1

    58ea816d8c4b753748f869c97f784daed609cedb

    SHA256

    bf1a4234dbd4f5e803c0b52d7c7efe2a47668b8977464f8be8358dbbc51f00f9

    SHA512

    c4d3532a69b8773e1672f2f982f243628c73e4711a7e865bc7210ade9f14b81312b64dcb8221d616893492c3302b093c4fc6602affe02d955ac794d53e848a4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd52c6be993619fe9f7e8f86635de2d9

    SHA1

    3b232c910934c531f49dea2dd3b43bf78fb465d8

    SHA256

    e27a24482e5d83601f08278fafebb615e9b6fd2b79c9c17c8cf095d64ef38e74

    SHA512

    fb63e533ca32ea0799c863d7b3c6079638c8326a7938ebb57081a59e8577676fe843aa9f66d026fa81650665e408f954eee86beb271578d0e1ed38418e2b383e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    beacf7bda310dc88afeb510ef9845f50

    SHA1

    fd40d50bbb06ae39d7bfe8b04ff87e4a3a190522

    SHA256

    bc3d40d1d552c48614e0f08ff08e891ec6724858cc2f0f191d9c622dd5caaaee

    SHA512

    531bbe148e26481a4108998be3d1c4e9c5671c8d17c9f92017ca7beec52b7a8dca0196744e6667cdf0ff2eabeb4a54655e721a99226906ed91f88a8e81763b1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97799f705e88e7b6d13be252aac5b068

    SHA1

    5e28c078df6e88f34f530c3ab0af5467c54332b4

    SHA256

    eb4caf9869e665c683571709865d67f09a37480fde1c58db3cae9d3086ba6b61

    SHA512

    a9595483e70b9ce74497f6d313c28371c1e49d54347abc0090fb2ffea414d86c3dfa1880135f3bb1033a1c91130005a4ad64e546e16291e335926c7d4f03f80b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89816338b0aa4bca471e453b34faa5ed

    SHA1

    9bf3618b0b56eb706f895220f01169b80f887104

    SHA256

    d22640790928d2fb81aa1061d4a6d912145ef9aa61f9e3a636aaef13f40e20dd

    SHA512

    28b5b445e40e17773c9ce22e89a9e31781863103981e252ef779780c86a9d4c6161b5ada63ca6ba70a1b524951b65f750ec04a3bf8ce1043e8a4ef64e9570138

  • C:\Users\Admin\AppData\Local\Temp\Cab344C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe

    Filesize

    3.1MB

    MD5

    cf049d1ba0fceeb5348f71e15889fbc4

    SHA1

    94cc88586240456f777aed403d955027555db8d1

    SHA256

    41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7

    SHA512

    2e7a7d3415164cb453193fdceef02d46c35f9103521b33bc424c9b79659fac2e4b9deb0fe8754f0842546b51403181032b6c7a05116adfc4f2b8fd599c3ad6ed

  • C:\Users\Admin\AppData\Local\Temp\Files\Money.exe

    Filesize

    3.1MB

    MD5

    fc6a9a66fb9a404078fe5c31d73c3bab

    SHA1

    2cfb6b088ed8ab7ca66299d094813ce2d04e5677

    SHA256

    695bc096a65c4bd026b95d5363a4b9c316cec8fec3672808e036081397da6df8

    SHA512

    5edd45b69ca36e87ae399eb8260eb47411575a7b8296007b948b8a7c4b8200c0bda115cd223029bf39095d64a5e1c0dbd381d4b6947a67560e0a9142e18a642f

  • C:\Users\Admin\AppData\Local\Temp\Tar345E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp168.tmp.bat

    Filesize

    150B

    MD5

    86f5bb46e87ad29063f05a0dff63b4c8

    SHA1

    2a3ca698b5090f5cb398d0c326ad013711c8a845

    SHA256

    878b8b1f00f56f36406d951e4a019884c35cb20ae2e8628f1f4659011c9167b1

    SHA512

    836bc87d4c00fee6fb93af64bb65fb6629af2a3189a5ec2ddab3b82fc150bb77e444c6f749b86d36d65b252b2927b5591799830f8dd01a3ed3b044cd3a674b08

  • \Users\Admin\AppData\Local\Temp\Files\aidans.dont.run.exe

    Filesize

    63KB

    MD5

    9efaf6b98fdde9df4532d1236b60619f

    SHA1

    5d1414d09d54de16b04cd0cd05ccfc0692588fd1

    SHA256

    7c8a5e6cf4e451d61157e113f431a1f3e606fba0e7147ffa9a8f429cb60e47d6

    SHA512

    eabc2c58a7b2d636f13b149199f2dc943c4af3296c5a4605b72293294a449a2ea8da432238748ca2fb69fb944a31ac6fae7e5310cdc57609e5955f62b71e812d

  • \Users\Admin\AppData\Local\Temp\Files\script.exe

    Filesize

    6KB

    MD5

    308d9beab0eccfd8f218a89456b9b7d4

    SHA1

    b444fa187f2762104248a6ad7d82b1e9e145e366

    SHA256

    3570eab57ac55e89ce4467d665502896790881a21e93a25aabb738fa368e9e02

    SHA512

    b74095e5bc85fd4aef7685a18d4e7c64c322ba66823e8da6cd96f8551abf10f6376ac32728d33f72eb616e25587b442ff5a03866821151d64ac2102cffe68955

  • \Users\Admin\AppData\Local\Temp\Files\wmfdist.exe

    Filesize

    3.9MB

    MD5

    6e05e7d536b34f171ed70e4353d553c2

    SHA1

    333750aa2d2121ad3e332ada651add83170b7bf8

    SHA256

    fd0754a2ef3567859db0bf3c75f18ec50aaeae6a7561aff9e7f6c7775a945ed7

    SHA512

    148be9744466f83ae89650fa461132266300cea8b08c793a320416f4a71a19fd3caf2e9258664040fcc44c06c77eb84bd5a7d1c47839d147c8ed5b5bee69610f

  • memory/1596-501-0x0000000000B90000-0x0000000000BA6000-memory.dmp

    Filesize

    88KB

  • memory/2280-135-0x0000000000EF0000-0x0000000001214000-memory.dmp

    Filesize

    3.1MB

  • memory/2416-146-0x00000000000A0000-0x00000000003C4000-memory.dmp

    Filesize

    3.1MB

  • memory/2468-140-0x00000000013A0000-0x00000000016C8000-memory.dmp

    Filesize

    3.2MB

  • memory/2676-128-0x0000000000B10000-0x0000000000E38000-memory.dmp

    Filesize

    3.2MB

  • memory/2676-117-0x000007FEF5D33000-0x000007FEF5D34000-memory.dmp

    Filesize

    4KB

  • memory/2720-166-0x0000000073ED0000-0x00000000745BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2720-148-0x0000000073EDE000-0x0000000073EDF000-memory.dmp

    Filesize

    4KB

  • memory/2720-0-0x0000000073EDE000-0x0000000073EDF000-memory.dmp

    Filesize

    4KB

  • memory/2720-2-0x0000000073ED0000-0x00000000745BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2720-1-0x00000000010D0000-0x00000000010D8000-memory.dmp

    Filesize

    32KB

  • memory/2976-471-0x0000000001010000-0x0000000001026000-memory.dmp

    Filesize

    88KB