Overview
overview
10Static
static
3QuarkPC.exe
windows11-21h2-x64
10$APPDATA/P...gs.vbs
windows11-21h2-x64
3$APPDATA/P...ns.ps1
windows11-21h2-x64
3$APPDATA/P...te.dll
windows11-21h2-x64
3$LOCALAPPD..._R.exe
windows11-21h2-x64
5$LOCALAPPD...32.exe
windows11-21h2-x64
3$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3$WINDIR/Text.ps1
windows11-21h2-x64
3QuarkPC.exe
windows11-21h2-x64
4Resubmissions
31/03/2025, 15:25
250331-st3p2svps7 10Analysis
-
max time kernel
90s -
max time network
105s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
31/03/2025, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
QuarkPC.exe
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
$APPDATA/Promotions/Logs.vbs
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
$APPDATA/Promotions/Promotions.ps1
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
$APPDATA/Promotions/Update.dll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
$LOCALAPPDATA/Protected_R.exe
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
$LOCALAPPDATA/SGuardSvc32.exe
Resource
win11-20250313-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20250314-en
Behavioral task
behavioral10
Sample
$WINDIR/Text.ps1
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
QuarkPC.exe
Resource
win11-20250313-en
General
-
Target
$LOCALAPPDATA/Protected_R.exe
-
Size
2.2MB
-
MD5
c2aa84ef33aed92c14425baa7569b01f
-
SHA1
39e8f13321d4dc528561d0be8f0c21de2166a812
-
SHA256
6a13d71314131a8b92c294b0a658b97de63bb8ab9fb058ae8f60914e9a4ed6f9
-
SHA512
fa806f12fb714ad391d4aa62339edbfbf7b2a765fb9e6091b0bc9f434662fc02cfd6fc99a8dfaee6a014c6412fbe0cf02c3b96bf5e5cf4efa9f0e2390b91e068
-
SSDEEP
24576:2f93zcv9ZhsSGSQoryOzozU63IqRNhB0kDKPTkkkkkkkNoIeAo:2f93zO9ZhBGlopzM3HRNr0so
Malware Config
Signatures
-
pid Process 4540 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4540 powershell.exe 4540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4540 powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\Protected_R.exe"C:\Users\Admin\AppData\Local\Temp\$LOCALAPPDATA\Protected_R.exe"1⤵PID:2820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -WindowStyle Minimized -c "& {$config=Get-Content -Path 'C:\Windows\win.ini:Config'; Invoke-Command -ScriptBlock([scriptblock]::Create($config)) }"1⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82