Analysis

  • max time kernel
    5s
  • max time network
    9s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    31/03/2025, 22:51

Errors

Reason
Machine shutdown

General

  • Target

    ItroublveTSC.exe

  • Size

    2.0MB

  • MD5

    7c2da2ae36228b8b66ec5e5029e90d08

  • SHA1

    d636baf89fd305a1f694611097ac6e7bcb1f244c

  • SHA256

    c6820f426b28b93295ca3b768780e8b372424fb72e94b5d0c094b030f53d4721

  • SHA512

    93cbc698211b0ab0f96ab3f0eb8d393bcd04580418e08fc6df9b935a7cdd091b619a0edab4771b4c887264b0eef6846e6e08a7be24a8681848a1885206a29960

  • SSDEEP

    49152:DL+qgtiXBVLcHD/QmJqRsVEzCeePMAnUD:OzcBVYHDjcyVMukAUD

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

zaidtheboii-50153.portmap.host:50153

Mutex

VNM_MUTEX_fNWmZ9wa8oprRXUo73

Attributes
  • encryption_key

    PJRTtGrfOi1c09c0GCYT

  • install_name

    OneDrive.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft One Drive

  • subdirectory

    Microsoft One Drive

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • VenomRAT

    VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

  • Venomrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.exe
    "C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Users\Admin\AppData\Roaming\ItroublveTSC.exe
      "C:\Users\Admin\AppData\Roaming\ItroublveTSC.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4356
    • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3396
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Microsoft One Drive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5164
      • C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe
        "C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe"
        3⤵
          PID:1072
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "Microsoft One Drive" /sc ONLOGON /tr "C:\Windows\SysWOW64\Microsoft One Drive\OneDrive.exe" /rl HIGHEST /f
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:5040
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\O41tj0Xt3QQs.bat" "
            4⤵
              PID:1996
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                5⤵
                  PID:1316
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 10 localhost
                  5⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:3028
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 2216
                4⤵
                • Program crash
                PID:2464
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell" Get-MpPreference -verbose
              3⤵
                PID:4948
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1072 -ip 1072
            1⤵
              PID:2392

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Microsoft OneDrive.exe

              Filesize

              550KB

              MD5

              3fce051fde9fbd1302b4ee16f604553b

              SHA1

              e137d2e6fa0007ddd0bf3a1215a68b37ef2ed653

              SHA256

              a34954a87d0f4354a21e40ea0e9a9eee4420f47987d40be854ea7b98d6d36226

              SHA512

              cb07f753043b7705b0e32bbf4e1ae8ddf6176851562dea567e75a4715b1beb4031d35a43b6bf0bc45d5b2da7430be0d87b6ae61b5b2e07c7c8950bb0247e4a5c

            • C:\Users\Admin\AppData\Local\Temp\O41tj0Xt3QQs.bat

              Filesize

              211B

              MD5

              0a70eb10d8fcbce201b2a2436597e374

              SHA1

              9d5ae1918bd395a5672142d4518b293ebb32a8aa

              SHA256

              a2ecaaec625e8e6e1c4b004e2d554a541fabb46175c95c7f0b79eab9ccf8d892

              SHA512

              dc4a5316a991002d295024b742bb78e250c83effac30cb85a5f8f8f8d51e5bd3af1328f91552957cc91461b248c3d745461c5dd07671f4dab7992e993bfc13b9

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z4z2vu1n.4vp.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Roaming\ItroublveTSC.exe

              Filesize

              3.9MB

              MD5

              53f43b1e9d99d6a356a332d9073b4736

              SHA1

              71e6c5a216a66b2b523b1b022d44c10b276c6195

              SHA256

              584bf67e7c8e93629e175733fe42907e60916047e68f1b4973d4cbf3dd2c22d6

              SHA512

              e7c5e4b26309e38dd1dd52b4f509c94fb9f50453e4d5c2ba895b02c48457a15c384866fdeb57185b628f10873ed6a6e6936ad170827f4855c9c5eca15ab8f959

            • memory/812-33-0x0000000074D10000-0x00000000752C1000-memory.dmp

              Filesize

              5.7MB

            • memory/812-0-0x0000000074D12000-0x0000000074D13000-memory.dmp

              Filesize

              4KB

            • memory/812-1-0x0000000074D10000-0x00000000752C1000-memory.dmp

              Filesize

              5.7MB

            • memory/812-2-0x0000000074D10000-0x00000000752C1000-memory.dmp

              Filesize

              5.7MB

            • memory/3396-44-0x0000000005DB0000-0x0000000005DC2000-memory.dmp

              Filesize

              72KB

            • memory/3396-37-0x0000000005DE0000-0x0000000006386000-memory.dmp

              Filesize

              5.6MB

            • memory/3396-39-0x0000000071E80000-0x0000000072631000-memory.dmp

              Filesize

              7.7MB

            • memory/3396-43-0x00000000057A0000-0x0000000005806000-memory.dmp

              Filesize

              408KB

            • memory/3396-35-0x0000000071E80000-0x0000000072631000-memory.dmp

              Filesize

              7.7MB

            • memory/3396-45-0x00000000069B0000-0x00000000069EC000-memory.dmp

              Filesize

              240KB

            • memory/3396-36-0x0000000000E50000-0x0000000000EE0000-memory.dmp

              Filesize

              576KB

            • memory/4356-34-0x0000000000950000-0x0000000000D36000-memory.dmp

              Filesize

              3.9MB

            • memory/4356-38-0x0000000005610000-0x00000000056A2000-memory.dmp

              Filesize

              584KB

            • memory/4356-41-0x0000000071E80000-0x0000000072631000-memory.dmp

              Filesize

              7.7MB

            • memory/4356-40-0x00000000055F0000-0x00000000055FA000-memory.dmp

              Filesize

              40KB

            • memory/4356-42-0x0000000071E80000-0x0000000072631000-memory.dmp

              Filesize

              7.7MB

            • memory/4356-32-0x0000000071E8E000-0x0000000071E8F000-memory.dmp

              Filesize

              4KB

            • memory/4948-47-0x0000000002AC0000-0x0000000002AF6000-memory.dmp

              Filesize

              216KB

            • memory/4948-54-0x0000000005D60000-0x0000000005D82000-memory.dmp

              Filesize

              136KB

            • memory/4948-59-0x0000000005F00000-0x0000000005F66000-memory.dmp

              Filesize

              408KB

            • memory/4948-60-0x0000000006050000-0x00000000063A7000-memory.dmp

              Filesize

              3.3MB

            • memory/4948-61-0x0000000006490000-0x00000000064AE000-memory.dmp

              Filesize

              120KB

            • memory/4948-62-0x0000000006540000-0x000000000658C000-memory.dmp

              Filesize

              304KB

            • memory/4948-48-0x0000000005690000-0x0000000005D5A000-memory.dmp

              Filesize

              6.8MB

            • memory/4948-71-0x0000000007630000-0x0000000007662000-memory.dmp

              Filesize

              200KB

            • memory/4948-72-0x000000006F890000-0x000000006F8DC000-memory.dmp

              Filesize

              304KB

            • memory/4948-82-0x0000000007690000-0x00000000076AE000-memory.dmp

              Filesize

              120KB

            • memory/4948-83-0x00000000076C0000-0x0000000007763000-memory.dmp

              Filesize

              652KB

            • memory/4948-84-0x0000000007E40000-0x00000000084BA000-memory.dmp

              Filesize

              6.5MB

            • memory/4948-85-0x0000000007800000-0x000000000781A000-memory.dmp

              Filesize

              104KB

            • memory/4948-86-0x0000000007860000-0x000000000786A000-memory.dmp

              Filesize

              40KB

            • memory/4948-87-0x0000000007A70000-0x0000000007B06000-memory.dmp

              Filesize

              600KB