Analysis
-
max time kernel
126s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 19:22
Behavioral task
behavioral1
Sample
MSFS2024UPDATER.exe
Resource
win7-20240903-en
General
-
Target
MSFS2024UPDATER.exe
-
Size
3.1MB
-
MD5
5061f9f48893af28f93d03dcfb71da43
-
SHA1
df81a197c29598332480a0e3fb32b69d31ee985e
-
SHA256
24361c88cec81a0e499d9c5b3acb69e6d9287515a12633b0a0034d2b67bf2d07
-
SHA512
3734e4acf53f921578eeb27cb0c2b2fb689812116e5e187e8afb1f83563da5e11ebbfce025f43ec7b6abac46fa8d6eabaf0cbcbb29701672e331576876ef5ab4
-
SSDEEP
49152:rvXlL26AaNeWgPhlmVqvMQ7XSK9xOEMkIk/JxroGdPxTHHB72eh2NT:rvVL26AaNeWgPhlmVqkQ7XSK9xn5
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.37:4782
49b0d307-a06e-42f0-b4dd-ceae2c88d2f0
-
encryption_key
B73F224CF41A826EF2EC1843B90021541FBE12A9
-
install_name
MSFS_2024_UPDATER.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MSFS_2024_UPDATER
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/3504-1-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral2/files/0x0009000000023dfc-5.dat family_quasar -
Downloads MZ/PE file 1 IoCs
flow pid Process 22 756 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 2536 MSFS_2024_UPDATER.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1368 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4088 schtasks.exe 3616 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3504 MSFS2024UPDATER.exe Token: SeDebugPrivilege 2536 MSFS_2024_UPDATER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2536 MSFS_2024_UPDATER.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3504 wrote to memory of 4088 3504 MSFS2024UPDATER.exe 89 PID 3504 wrote to memory of 4088 3504 MSFS2024UPDATER.exe 89 PID 3504 wrote to memory of 2536 3504 MSFS2024UPDATER.exe 91 PID 3504 wrote to memory of 2536 3504 MSFS2024UPDATER.exe 91 PID 2536 wrote to memory of 3616 2536 MSFS_2024_UPDATER.exe 92 PID 2536 wrote to memory of 3616 2536 MSFS_2024_UPDATER.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MSFS2024UPDATER.exe"C:\Users\Admin\AppData\Local\Temp\MSFS2024UPDATER.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MSFS_2024_UPDATER" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MSFS_2024_UPDATER.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4088
-
-
C:\Users\Admin\AppData\Roaming\SubDir\MSFS_2024_UPDATER.exe"C:\Users\Admin\AppData\Roaming\SubDir\MSFS_2024_UPDATER.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MSFS_2024_UPDATER" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MSFS_2024_UPDATER.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3616
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODg4NDY3NTA0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55061f9f48893af28f93d03dcfb71da43
SHA1df81a197c29598332480a0e3fb32b69d31ee985e
SHA25624361c88cec81a0e499d9c5b3acb69e6d9287515a12633b0a0034d2b67bf2d07
SHA5123734e4acf53f921578eeb27cb0c2b2fb689812116e5e187e8afb1f83563da5e11ebbfce025f43ec7b6abac46fa8d6eabaf0cbcbb29701672e331576876ef5ab4