Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    11s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/03/2025, 03:52

General

  • Target

    Bloom Reducer.exe

  • Size

    502KB

  • MD5

    df5da5f129d8b2b9ebcadd00f88da030

  • SHA1

    afe7fbc6c2462fcdab5edfb40db828297832b5ea

  • SHA256

    3e77ae72af3f9a18de88cb41b6686253d5b20e2ed215a26217b96520415db1d5

  • SHA512

    6832b2c35b367190ba4a4eb8ac54476c63836321c8d77089c86c6b2016dba6badd4d6555ec450433a572b7b3b8388f2b4b793e720f859ddf8e6db2b5b8d21fac

  • SSDEEP

    6144:wTEgdc0YhebGbXOsA6j1RdhHudPSBlh/nKRFwQHocEP0b8F96y24GkficTR3u:wTEgdfY5A6PukGFwffUy24ficdu

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

chaarlie-44115.portmap.host:44115

Mutex

ba91e72b-9fea-40fe-830d-df56f58d0810

Attributes
  • encryption_key

    6B1195D9FAF0B46710DC1B441D5B78F5F750CCC8

  • install_name

    bloom reducer.exe

  • log_directory

    Logs

  • reconnect_delay

    1000

  • startup_key

    system32

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bloom Reducer.exe
    "C:\Users\Admin\AppData\Local\Temp\Bloom Reducer.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "system32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Bloom Reducer.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:532
    • C:\Windows\system32\SubDir\bloom reducer.exe
      "C:\Windows\system32\SubDir\bloom reducer.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "system32" /sc ONLOGON /tr "C:\Windows\system32\SubDir\bloom reducer.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2528
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\vaq8ATZ0yzvb.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2824
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2776
          • C:\Windows\system32\SubDir\bloom reducer.exe
            "C:\Windows\system32\SubDir\bloom reducer.exe"
            4⤵
            • Executes dropped EXE
            PID:1760
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "system32" /sc ONLOGON /tr "C:\Windows\system32\SubDir\bloom reducer.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:1876
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\H3lkwQjlhPjE.bat" "
              5⤵
                PID:2220
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  6⤵
                    PID:336
                  • C:\Windows\system32\PING.EXE
                    ping -n 10 localhost
                    6⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:2804
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe"
          1⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2192
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ce9758,0x7fef6ce9768,0x7fef6ce9778
            2⤵
              PID:2720
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1208 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:2
              2⤵
                PID:1300
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1452 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:8
                2⤵
                  PID:1532
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:8
                  2⤵
                    PID:3008
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2124 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:1
                    2⤵
                      PID:2348
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2244 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:1
                      2⤵
                        PID:2444
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1888 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:2
                        2⤵
                          PID:1660
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1316 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:1
                          2⤵
                            PID:936
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3412 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:8
                            2⤵
                              PID:2380
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3464 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:8
                              2⤵
                                PID:1336
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1404,i,10351775605520855324,912573438442569399,131072 /prefetch:8
                                2⤵
                                  PID:2252
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:572

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\4e476254-1fae-4f9f-b12c-3bbe0559d6f7.tmp

                                  Filesize

                                  351KB

                                  MD5

                                  07da8e74293f9f069ed4f11b2fe1c1cb

                                  SHA1

                                  8bc3172297962e1450619ce48a70f0aa537e0536

                                  SHA256

                                  61a310dd20925fdbd82cb44a8dfc26cc9d9a2ec03e035009dc5370321aa123ea

                                  SHA512

                                  fd6a8c5e004d7805e9ae7247b5e949d2c4f4799f8ef7f47e2f3dc5760f1c53fe32b015e743d289eb399e0b61e6109154e9abfd9afc12931826845a1ce658abe9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  aefd77f47fb84fae5ea194496b44c67a

                                  SHA1

                                  dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                  SHA256

                                  4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                  SHA512

                                  b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Temp\H3lkwQjlhPjE.bat

                                  Filesize

                                  203B

                                  MD5

                                  137bc1a13f3687f048aea03d5a41021d

                                  SHA1

                                  22397492aea1e004fe08ab6ffcb19708f48a4a6e

                                  SHA256

                                  344802266b10567737141e4e250686e473403c0eb8ad5270ac5666f0e2ab3d62

                                  SHA512

                                  1b95a9a779fff2191371ebc80a6631e42b85013e7495f7a096b59e21cb4c87290627ca8d20a7fe6c23204bf92f46b312f546fa2d7d01f0e553f4001184b5d09c

                                • C:\Users\Admin\AppData\Local\Temp\vaq8ATZ0yzvb.bat

                                  Filesize

                                  203B

                                  MD5

                                  adf7afa013cb3c566219d27ffa05b1c0

                                  SHA1

                                  8a8ba6cd999e1b8d06233fa322cb4db4330ae3d6

                                  SHA256

                                  a0aa263cf93e7bf11cca9141b3bf8e15b844ee5a73a59eebd9daf2dcf3c2cd0d

                                  SHA512

                                  ec4fe643ded99dbed5f1abc263defcaa7feda042b36cf00c41743d9302269d0d0f9ea0861699912d714243a53a983443d0c6aa7e94b97805ba220ce1fa7e92c5

                                • C:\Windows\System32\SubDir\bloom reducer.exe

                                  Filesize

                                  502KB

                                  MD5

                                  df5da5f129d8b2b9ebcadd00f88da030

                                  SHA1

                                  afe7fbc6c2462fcdab5edfb40db828297832b5ea

                                  SHA256

                                  3e77ae72af3f9a18de88cb41b6686253d5b20e2ed215a26217b96520415db1d5

                                  SHA512

                                  6832b2c35b367190ba4a4eb8ac54476c63836321c8d77089c86c6b2016dba6badd4d6555ec450433a572b7b3b8388f2b4b793e720f859ddf8e6db2b5b8d21fac

                                • memory/1760-80-0x00000000010C0000-0x0000000001144000-memory.dmp

                                  Filesize

                                  528KB

                                • memory/1816-10-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/1816-0-0x000007FEF57C3000-0x000007FEF57C4000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1816-2-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/1816-1-0x0000000000860000-0x00000000008E4000-memory.dmp

                                  Filesize

                                  528KB

                                • memory/2516-9-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2516-20-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2516-8-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

                                  Filesize

                                  9.9MB

                                • memory/2516-7-0x0000000000AB0000-0x0000000000B34000-memory.dmp

                                  Filesize

                                  528KB