Analysis
-
max time kernel
25s -
max time network
26s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-01-2025 22:56
Static task
static1
General
-
Target
Aimbot MTA.zip
-
Size
1.1MB
-
MD5
daa57cdeeab30823f89e5349b832a817
-
SHA1
feb679856d7a4a04d5e1a26e741dd6deb5ee0e88
-
SHA256
129c9712c6553669392a034fc14842a4045df98bb8abce95a6b74ecf9760a4de
-
SHA512
1403f94c54374a91e8d9e29b594b490ff49c16b4bd404148157e7b2a7eb57beced3459e612045433e3b4a0f78aca93d34fe2f4c198fc5669dee85c139273f376
-
SSDEEP
24576:3bPC4RI32t9KyRPCKNJrYjWj1JkpsnWvWjI7mBPJiOMSeFAPNuHWE:rKsIm3K8voCApsnBnFJirjSU2E
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
WindowsUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsUpdate
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0028000000046158-2.dat family_quasar behavioral1/memory/2880-5-0x0000000000810000-0x0000000000B66000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 2880 Aimbot MTA.exe 3380 WindowsUpdate.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133817146419315125" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4880 schtasks.exe 3372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeRestorePrivilege 3360 7zFM.exe Token: 35 3360 7zFM.exe Token: SeSecurityPrivilege 3360 7zFM.exe Token: SeDebugPrivilege 2880 Aimbot MTA.exe Token: SeDebugPrivilege 3380 WindowsUpdate.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe Token: SeShutdownPrivilege 2128 chrome.exe Token: SeCreatePagefilePrivilege 2128 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3360 7zFM.exe 3360 7zFM.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3380 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 4880 2880 Aimbot MTA.exe 85 PID 2880 wrote to memory of 4880 2880 Aimbot MTA.exe 85 PID 2880 wrote to memory of 3380 2880 Aimbot MTA.exe 87 PID 2880 wrote to memory of 3380 2880 Aimbot MTA.exe 87 PID 3380 wrote to memory of 3372 3380 WindowsUpdate.exe 88 PID 3380 wrote to memory of 3372 3380 WindowsUpdate.exe 88 PID 2128 wrote to memory of 4044 2128 chrome.exe 92 PID 2128 wrote to memory of 4044 2128 chrome.exe 92 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 4132 2128 chrome.exe 93 PID 2128 wrote to memory of 1456 2128 chrome.exe 94 PID 2128 wrote to memory of 1456 2128 chrome.exe 94 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 PID 2128 wrote to memory of 4792 2128 chrome.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Aimbot MTA.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3360
-
C:\Users\Admin\Desktop\Aimbot MTA.exe"C:\Users\Admin\Desktop\Aimbot MTA.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4880
-
-
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3372
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffefb58cc40,0x7ffefb58cc4c,0x7ffefb58cc582⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2200 /prefetch:32⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2316 /prefetch:82⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4496,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4380 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5036,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5216,i,17951505395339017194,1049048508276368773,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3320 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD567e46f76e994e5ffd00717eed8ca8027
SHA1e9d70b0120a1043b96f2738277f25f408e1d88a0
SHA2563b388db5f033f934f0019f221650de3691667b605f73463103abe4000f7f1dc1
SHA512c1be6ecd2b2ae40d19630970adf61b6c0331c7f0b95742b4375f5b0d7e3f51273d8e5fee1f6bf60b18eefe43644b09f5c62c9c38c41758e4f1dc878dfe8166d7
-
Filesize
8KB
MD535014f835af422214bae9a394c23814f
SHA1678b51dec62500a2752146d19094318536cb6e29
SHA25640c33cb225c2b3f5d97d7cca077fdf4680dd7db82dd89001d6a2c4c8fe0d1d47
SHA51253dc7e97d133f3fb06b41fd07b5bf2db0e31b7ab864718af3dbc868b9ea4adedd01df15b70711a1c21c92a703854fc033af001e0aae0951966b63f3dc713ed3e
-
Filesize
233KB
MD57a3e28d114a49607ceda2ef28cfb76d1
SHA196b517f6b3a0ee399921cf0d83ba1329b4eaee91
SHA256858599960256580282a0ddbe252136906f03746fb1a86915a2ae5da8f797c316
SHA5128bcadef96363bfa17f9f6c1a7cfc6f38aa8fb30765a70412c539adf34f24493633fbdf4d3726314d50016f27ee1b8a81e9c6271c4fbaf48ea9e8378aa9b9d54f
-
Filesize
3.3MB
MD5232fbce8fc20397039e7115d6736c5f4
SHA1ec3f9e41474a0e2597c5aec4be25158ccd2d4c68
SHA256f9a036faaf0d8069cad71070e3327f2b6318e7026338c32eb46dc23c18ab1291
SHA512b00d44a3fc0685b917a50008d66efd44c697692a7f02b2bc18f3c325642a8bb94d5966bd66d21fa045aa24d02a88600b3b66122e3a3f6309b3854f6820bc41de