Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 17:40
Behavioral task
behavioral1
Sample
PatricksParabox.exe.bin.exe
Resource
win7-20240729-en
General
-
Target
PatricksParabox.exe.bin.exe
-
Size
3.2MB
-
MD5
0a717705a7797e35b6f5af62ffe43abb
-
SHA1
4c823754c6cebe13ae0aec7ba874318f20445145
-
SHA256
c973b6a179d4477cc0d52ca84e6083a679988d991b53cb29573c75668b154f2e
-
SHA512
75d39a3fbbf3b6289330aab45471d497dec51d076dc96bf29b0bc526154bb9502745f08aee14624bca8c7b0f2c5822e2f81a8b959cd8348457015b06a2fe9ead
-
SSDEEP
98304:zvr62XlaSFNWPjljiFXRoUYITrUCgLEEa1:75ZY2gLEEa1
Malware Config
Extracted
quasar
1.4.1
Hugrix
prxprodquasar.zapto.org:4782
ad6032ec-a1ba-49fe-a6c9-21a847436cda
-
encryption_key
7AB142AC063BEB01BE33EE315E2D0BBA3E071A0B
-
install_name
JavaUpdater.exe
-
log_directory
JavaInstallLogs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
Java
Extracted
latentbot
prxprodquasar.zapto.org
Signatures
-
Latentbot family
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/2668-1-0x00000000003B0000-0x00000000006EE000-memory.dmp family_quasar behavioral2/files/0x0008000000023d43-5.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3760 JavaUpdater.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\Java PatricksParabox.exe.bin.exe File opened for modification C:\Windows\system32\Java\JavaUpdater.exe JavaUpdater.exe File opened for modification C:\Windows\system32\Java JavaUpdater.exe File created C:\Windows\system32\Java\JavaUpdater.exe PatricksParabox.exe.bin.exe File opened for modification C:\Windows\system32\Java\JavaUpdater.exe PatricksParabox.exe.bin.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3712 schtasks.exe 5004 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2668 PatricksParabox.exe.bin.exe Token: SeDebugPrivilege 3760 JavaUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3760 JavaUpdater.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2668 wrote to memory of 3712 2668 PatricksParabox.exe.bin.exe 87 PID 2668 wrote to memory of 3712 2668 PatricksParabox.exe.bin.exe 87 PID 2668 wrote to memory of 3760 2668 PatricksParabox.exe.bin.exe 89 PID 2668 wrote to memory of 3760 2668 PatricksParabox.exe.bin.exe 89 PID 3760 wrote to memory of 5004 3760 JavaUpdater.exe 92 PID 3760 wrote to memory of 5004 3760 JavaUpdater.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PatricksParabox.exe.bin.exe"C:\Users\Admin\AppData\Local\Temp\PatricksParabox.exe.bin.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Windows\system32\Java\JavaUpdater.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3712
-
-
C:\Windows\system32\Java\JavaUpdater.exe"C:\Windows\system32\Java\JavaUpdater.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Windows\system32\Java\JavaUpdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD50a717705a7797e35b6f5af62ffe43abb
SHA14c823754c6cebe13ae0aec7ba874318f20445145
SHA256c973b6a179d4477cc0d52ca84e6083a679988d991b53cb29573c75668b154f2e
SHA51275d39a3fbbf3b6289330aab45471d497dec51d076dc96bf29b0bc526154bb9502745f08aee14624bca8c7b0f2c5822e2f81a8b959cd8348457015b06a2fe9ead