Analysis
-
max time kernel
5s -
max time network
9s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 22:51
Static task
static1
Errors
General
-
Target
ItroublveTSC.exe
-
Size
2.0MB
-
MD5
7c2da2ae36228b8b66ec5e5029e90d08
-
SHA1
d636baf89fd305a1f694611097ac6e7bcb1f244c
-
SHA256
c6820f426b28b93295ca3b768780e8b372424fb72e94b5d0c094b030f53d4721
-
SHA512
93cbc698211b0ab0f96ab3f0eb8d393bcd04580418e08fc6df9b935a7cdd091b619a0edab4771b4c887264b0eef6846e6e08a7be24a8681848a1885206a29960
-
SSDEEP
49152:DL+qgtiXBVLcHD/QmJqRsVEzCeePMAnUD:OzcBVYHDjcyVMukAUD
Malware Config
Extracted
quasar
2.1.0.0
Office04
zaidtheboii-50153.portmap.host:50153
VNM_MUTEX_fNWmZ9wa8oprRXUo73
-
encryption_key
PJRTtGrfOi1c09c0GCYT
-
install_name
OneDrive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft One Drive
-
subdirectory
Microsoft One Drive
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x00080000000281bc-21.dat disable_win_def behavioral1/memory/3396-36-0x0000000000E50000-0x0000000000EE0000-memory.dmp disable_win_def -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000281bc-21.dat family_quasar behavioral1/memory/3396-36-0x0000000000E50000-0x0000000000EE0000-memory.dmp family_quasar -
Venomrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Control Panel\International\Geo\Nation ItroublveTSC.exe -
Executes dropped EXE 2 IoCs
pid Process 4356 ItroublveTSC.exe 3396 Microsoft OneDrive.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2464 1072 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ItroublveTSC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ItroublveTSC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft OneDrive.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3028 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3028 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5164 schtasks.exe 5040 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4356 ItroublveTSC.exe Token: SeDebugPrivilege 3396 Microsoft OneDrive.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4356 ItroublveTSC.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4356 ItroublveTSC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 812 wrote to memory of 4356 812 ItroublveTSC.exe 83 PID 812 wrote to memory of 4356 812 ItroublveTSC.exe 83 PID 812 wrote to memory of 4356 812 ItroublveTSC.exe 83 PID 812 wrote to memory of 3396 812 ItroublveTSC.exe 84 PID 812 wrote to memory of 3396 812 ItroublveTSC.exe 84 PID 812 wrote to memory of 3396 812 ItroublveTSC.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.exe"C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Roaming\ItroublveTSC.exe"C:\Users\Admin\AppData\Roaming\ItroublveTSC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3396 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft One Drive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:5164
-
-
C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe"C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe"3⤵PID:1072
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft One Drive" /sc ONLOGON /tr "C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\O41tj0Xt3QQs.bat" "4⤵PID:1996
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:1316
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 22164⤵
- Program crash
PID:2464
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1072 -ip 10721⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD53fce051fde9fbd1302b4ee16f604553b
SHA1e137d2e6fa0007ddd0bf3a1215a68b37ef2ed653
SHA256a34954a87d0f4354a21e40ea0e9a9eee4420f47987d40be854ea7b98d6d36226
SHA512cb07f753043b7705b0e32bbf4e1ae8ddf6176851562dea567e75a4715b1beb4031d35a43b6bf0bc45d5b2da7430be0d87b6ae61b5b2e07c7c8950bb0247e4a5c
-
Filesize
211B
MD50a70eb10d8fcbce201b2a2436597e374
SHA19d5ae1918bd395a5672142d4518b293ebb32a8aa
SHA256a2ecaaec625e8e6e1c4b004e2d554a541fabb46175c95c7f0b79eab9ccf8d892
SHA512dc4a5316a991002d295024b742bb78e250c83effac30cb85a5f8f8f8d51e5bd3af1328f91552957cc91461b248c3d745461c5dd07671f4dab7992e993bfc13b9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.9MB
MD553f43b1e9d99d6a356a332d9073b4736
SHA171e6c5a216a66b2b523b1b022d44c10b276c6195
SHA256584bf67e7c8e93629e175733fe42907e60916047e68f1b4973d4cbf3dd2c22d6
SHA512e7c5e4b26309e38dd1dd52b4f509c94fb9f50453e4d5c2ba895b02c48457a15c384866fdeb57185b628f10873ed6a6e6936ad170827f4855c9c5eca15ab8f959