Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2025 17:17
Behavioral task
behavioral1
Sample
rat.exe
Resource
win7-20241023-en
General
-
Target
rat.exe
-
Size
3.1MB
-
MD5
0ef2261e6587f8b552ec3da98331ff26
-
SHA1
7c8a1b9fd589576d1979c5576219e734ce7a0699
-
SHA256
2dac612eb9e1901ccc9dba9b03680a3a330b4084f0aeb8d543f3c7a595644829
-
SHA512
ab6363753345ede1b29d8ef3a9592e9febbbb25348d77a2f214a0d7e08301f6596c99fbeb1ee6b62edb426454562dc74657f295a876021bba8610b6f9a9c2e34
-
SSDEEP
49152:evHI22SsaNYfdPBldt698dBcjHpxDEDw1k/JxQoGdtTHHB72eh2NT:evo22SsaNYfdPBldt6+dBcjHpxW+
Malware Config
Extracted
quasar
1.4.1
Office01
sabaf-38910.portmap.host:38910
f7356d60-951e-494a-a901-2e12bb084129
-
encryption_key
5C7AC20AEB149D8BC06141FCF79866AD6E3847AD
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RunTimeBroker
-
subdirectory
System32
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/1152-1-0x00000000009A0000-0x0000000000CC4000-memory.dmp family_quasar behavioral2/files/0x0008000000023e25-6.dat family_quasar -
Downloads MZ/PE file 1 IoCs
flow pid Process 29 4400 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 4788 RuntimeBroker.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\System32\RuntimeBroker.exe rat.exe File opened for modification C:\Windows\system32\System32\RuntimeBroker.exe rat.exe File opened for modification C:\Windows\system32\System32 rat.exe File opened for modification C:\Windows\system32\System32\RuntimeBroker.exe RuntimeBroker.exe File opened for modification C:\Windows\system32\System32 RuntimeBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5104 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4688 schtasks.exe 3332 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1152 rat.exe Token: SeDebugPrivilege 4788 RuntimeBroker.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4788 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1152 wrote to memory of 4688 1152 rat.exe 90 PID 1152 wrote to memory of 4688 1152 rat.exe 90 PID 1152 wrote to memory of 4788 1152 rat.exe 92 PID 1152 wrote to memory of 4788 1152 rat.exe 92 PID 4788 wrote to memory of 3332 4788 RuntimeBroker.exe 93 PID 4788 wrote to memory of 3332 4788 RuntimeBroker.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rat.exe"C:\Users\Admin\AppData\Local\Temp\rat.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RunTimeBroker" /sc ONLOGON /tr "C:\Windows\system32\System32\RuntimeBroker.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4688
-
-
C:\Windows\system32\System32\RuntimeBroker.exe"C:\Windows\system32\System32\RuntimeBroker.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RunTimeBroker" /sc ONLOGON /tr "C:\Windows\system32\System32\RuntimeBroker.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3332
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTVFNTcxMEQtQjhGMy00RDQyLUJBRkUtQzQ0RUZDQTEzOTJEfSIgdXNlcmlkPSJ7ODY3MkMwRjUtODYzNS00NzE4LTg4ODQtQzNCNURBNTA2QkI1fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RUI2RkNBNkEtNkFCOC00QThCLTgwQzAtRTIwN0YxRTBGNTU5fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTQzOTU4MDYxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5104
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD50ef2261e6587f8b552ec3da98331ff26
SHA17c8a1b9fd589576d1979c5576219e734ce7a0699
SHA2562dac612eb9e1901ccc9dba9b03680a3a330b4084f0aeb8d543f3c7a595644829
SHA512ab6363753345ede1b29d8ef3a9592e9febbbb25348d77a2f214a0d7e08301f6596c99fbeb1ee6b62edb426454562dc74657f295a876021bba8610b6f9a9c2e34