Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/03/2025, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
Downloads.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Downloads.exe
Resource
win10v2004-20250314-en
General
-
Target
Downloads.exe
-
Size
30.0MB
-
MD5
ec06a1b0ea6f4debdc9778b59b63ec30
-
SHA1
9d40cf615c4d9f4c21b892fa5506a8f852cb3e1d
-
SHA256
1942639c541470539b15b8fea26b1a02b2182ced0f42f22af143c5170bb01cc6
-
SHA512
d62b9c59d933cda1879fd00d997deb60b952c1573d385638306ecdfdb8604aae56fcc0437566818b688fa694769948b4b8cadcb33e7bce98e69f15f753d973b6
-
SSDEEP
786432:zuTAzEyI4EETMmFxGF3khP1kGYJh5WcR0SGnCP+W:Rf3QUGUPCJnWqDP+W
Malware Config
Extracted
quasar
1.4.1
Office04
102.41.58.213:5505
1e97a2db-0622-4c39-84ac-2f640c70aaf5
-
encryption_key
1F6CCF154B4C85A58D675CA9A482E9C7A041C879
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Extracted
asyncrat
0.5.8
Default
197.48.105.157:5505
41.233.14.164:5505
197.48.230.161:5505
102.41.58.213:5505
q0nJ1vo1fsSD
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000012102-20.dat family_quasar behavioral1/memory/2548-149-0x0000000000860000-0x0000000000B84000-memory.dmp family_quasar behavioral1/memory/1560-215-0x0000000000B80000-0x0000000000EA4000-memory.dmp family_quasar -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0035000000015ccc-37.dat family_asyncrat -
Executes dropped EXE 8 IoCs
pid Process 2548 v2.exe 2712 svchost.exe 1260 Built.exe 1408 main.exe 2724 Built.exe 1296 main.exe 1560 svchost.exe 1792 svchost.exe -
Loads dropped DLL 10 IoCs
pid Process 2764 Downloads.exe 2764 Downloads.exe 1260 Built.exe 2724 Built.exe 1408 main.exe 1296 main.exe 1148 Process not Found 2244 cmd.exe 1148 Process not Found 1148 Process not Found -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\SubDir\svchost.exe v2.exe File opened for modification C:\Windows\system32\SubDir\svchost.exe v2.exe File opened for modification C:\Windows\system32\SubDir v2.exe File opened for modification C:\Windows\system32\SubDir\svchost.exe svchost.exe File opened for modification C:\Windows\system32\SubDir svchost.exe -
resource yara_rule behavioral1/files/0x0005000000019240-96.dat upx behavioral1/memory/2724-147-0x000007FEF6570000-0x000007FEF6BD4000-memory.dmp upx behavioral1/files/0x000500000001c783-208.dat upx behavioral1/memory/1296-209-0x000007FEF52D0000-0x000007FEF573E000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000015d48-51.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2388 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main Downloads.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2516 schtasks.exe 1484 schtasks.exe 1848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2548 v2.exe Token: SeDebugPrivilege 1560 svchost.exe Token: SeDebugPrivilege 2712 svchost.exe Token: SeDebugPrivilege 1792 svchost.exe Token: SeDebugPrivilege 1792 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2764 Downloads.exe 2764 Downloads.exe 1560 svchost.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2548 2764 Downloads.exe 31 PID 2764 wrote to memory of 2548 2764 Downloads.exe 31 PID 2764 wrote to memory of 2548 2764 Downloads.exe 31 PID 2764 wrote to memory of 2712 2764 Downloads.exe 32 PID 2764 wrote to memory of 2712 2764 Downloads.exe 32 PID 2764 wrote to memory of 2712 2764 Downloads.exe 32 PID 2764 wrote to memory of 2712 2764 Downloads.exe 32 PID 2764 wrote to memory of 1260 2764 Downloads.exe 33 PID 2764 wrote to memory of 1260 2764 Downloads.exe 33 PID 2764 wrote to memory of 1260 2764 Downloads.exe 33 PID 2764 wrote to memory of 1408 2764 Downloads.exe 34 PID 2764 wrote to memory of 1408 2764 Downloads.exe 34 PID 2764 wrote to memory of 1408 2764 Downloads.exe 34 PID 1260 wrote to memory of 2724 1260 Built.exe 35 PID 1260 wrote to memory of 2724 1260 Built.exe 35 PID 1260 wrote to memory of 2724 1260 Built.exe 35 PID 1408 wrote to memory of 1296 1408 main.exe 36 PID 1408 wrote to memory of 1296 1408 main.exe 36 PID 1408 wrote to memory of 1296 1408 main.exe 36 PID 2548 wrote to memory of 2516 2548 v2.exe 37 PID 2548 wrote to memory of 2516 2548 v2.exe 37 PID 2548 wrote to memory of 2516 2548 v2.exe 37 PID 2548 wrote to memory of 1560 2548 v2.exe 39 PID 2548 wrote to memory of 1560 2548 v2.exe 39 PID 2548 wrote to memory of 1560 2548 v2.exe 39 PID 1560 wrote to memory of 1484 1560 svchost.exe 40 PID 1560 wrote to memory of 1484 1560 svchost.exe 40 PID 1560 wrote to memory of 1484 1560 svchost.exe 40 PID 2712 wrote to memory of 1676 2712 svchost.exe 43 PID 2712 wrote to memory of 1676 2712 svchost.exe 43 PID 2712 wrote to memory of 1676 2712 svchost.exe 43 PID 2712 wrote to memory of 1676 2712 svchost.exe 43 PID 2712 wrote to memory of 2244 2712 svchost.exe 45 PID 2712 wrote to memory of 2244 2712 svchost.exe 45 PID 2712 wrote to memory of 2244 2712 svchost.exe 45 PID 2712 wrote to memory of 2244 2712 svchost.exe 45 PID 1676 wrote to memory of 1848 1676 cmd.exe 47 PID 1676 wrote to memory of 1848 1676 cmd.exe 47 PID 1676 wrote to memory of 1848 1676 cmd.exe 47 PID 1676 wrote to memory of 1848 1676 cmd.exe 47 PID 2244 wrote to memory of 2388 2244 cmd.exe 48 PID 2244 wrote to memory of 2388 2244 cmd.exe 48 PID 2244 wrote to memory of 2388 2244 cmd.exe 48 PID 2244 wrote to memory of 2388 2244 cmd.exe 48 PID 2244 wrote to memory of 1792 2244 cmd.exe 49 PID 2244 wrote to memory of 1792 2244 cmd.exe 49 PID 2244 wrote to memory of 1792 2244 cmd.exe 49 PID 2244 wrote to memory of 1792 2244 cmd.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Downloads.exe"C:\Users\Admin\AppData\Local\Temp\Downloads.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Windows\system32\SubDir\svchost.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2516
-
-
C:\Windows\system32\SubDir\svchost.exe"C:\Windows\system32\SubDir\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Windows\system32\SubDir\svchost.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp20BA.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2388
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Built.exe"C:\Users\Admin\AppData\Local\Temp\Built.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD587955e082fa9276925d051fe0cf04374
SHA1d913ea62f3a3de054005827146396354b9cf109c
SHA25657c34ddd4dac10f0bd1298fb601622a83c29b682da1da865b6c3e75f7822778c
SHA5126afce8e9ddc6a1dd410b4e0ccc948a47279a38827dccaff4c6e5e77c7c6a1822ac4f350b5109c172d14a293d2ba513a179c1ba03eba8e2fadfc37878792e4409
-
Filesize
1.8MB
MD52a4aad7818d527bbea76e9e81077cc21
SHA14db3b39874c01bf3ba1ab8659957bbc28aab1ab2
SHA2564712a6bb81b862fc292fcd857cef931ca8e4c142e70eaa4fd7a8d0a96aff5e7e
SHA512d10631b7fc25a8b9cc038514e9db1597cec0580ee34a56ce5cfc5a33e7010b5e1df7f15ec30ebb351356e2b815528fb4161956f26b5bfaf3dce7bc6701b79c68
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
45KB
MD57a358df346afcd7c4202a27469d3bc3f
SHA1721cba1692ce475b90bb07509e122bba225676d6
SHA25649d72d7fc3ea35487f53feb6fb2b874ca43c441867b04e775c785e9c1637abad
SHA512336bc9ff4526424296045a60298c1713d2818d4fea434cfefa8771215bc1ba82d814158b699ffa497247f5185ba56f24724626086eef14bf83e58deb5286684f
-
Filesize
151B
MD58f3eba633eb31a484184f0400a5d02e1
SHA12f03cbc7c381f732ee5cf9f90054126924865dc4
SHA2566fc795195972e7a3eedb2e3925839ae2017b7b65ada76d8b32aa63daf3f090fa
SHA5124e9597f8d50473fcfe8cb8a7fd2f181ded82434208afcda0807c89497b5481bfbba8b04047e2586323af885f0e78f63eb6b42b0917ff3e389ef5e84e39124198
-
Filesize
3.1MB
MD544bf522a553e8fde9a377f75fde20442
SHA10f9cb72fe60c334f6aa0c6ae642f5d9867a4ff8e
SHA2561467681b3b224b5447b70e54088ded2dd27ca04ea5f27f14dfe6ce8369ad73b7
SHA512f72c59872ed8954d7ec4ab3e109c19bb7b2a750b1e7041a0aff9b38f0726d5bbaedc364f549a401c9f827d988521204f5c765ef286ff8d9d609ca4e1e5886879
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378
-
Filesize
21.3MB
MD5515af45a33fa20e3ca9c2dd8af26173a
SHA12808e1c0abbe4ceb5f6dbc28d3ae7324a4a916b4
SHA25626e339ac703a76ffe511176ecd7cf51507ed1510fdb28bf5b43cde652cf133cb
SHA512539a3eefef4d5514d6e04d5aa17aa143a985b6d80d7926eb8d2f0be279aeac05c47ab5693a6fcdbfd26ac8b57ae564b0f77c725300cdd94943804ab1469b7e90