Analysis
-
max time kernel
126s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2025, 23:35
Behavioral task
behavioral1
Sample
Dynastyn.exe
Resource
win10v2004-20250314-en
General
-
Target
Dynastyn.exe
-
Size
3.1MB
-
MD5
7278f8e052dfce0ab3b0e26342df90c7
-
SHA1
b8e1a85020c3bc897bee6d2dfa2b0b7a0066a877
-
SHA256
370e43173ca787e6fdb25e366832b962e7361842a8c935275ea10e996a1e65dc
-
SHA512
d8dfc255717d1756ae67720e17d21098c20ea62ddf2fd4ecc2eb45ce228c12bce655b7754879a834850b9ff831fa58b66daed54d69f869983473b20fbacd11f4
-
SSDEEP
49152:evBt62XlaSFNWPjljiFa2RoUYI/US21J/+oGdo7THHB72eh2NT:evr62XlaSFNWPjljiFXRoUYI/USf4
Malware Config
Extracted
quasar
1.4.1
Dynasty
192.168.1.15:6811
1874328e-c44e-4a21-9487-360438f0be06
-
encryption_key
A293A810C06D86E5BF7959B54E0B6A129843E485
-
install_name
System.exe
-
log_directory
Dynasty
-
reconnect_delay
3000
-
startup_key
System.exe
-
subdirectory
system64x
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3004-1-0x0000000000910000-0x0000000000C34000-memory.dmp family_quasar behavioral1/files/0x00070000000242c6-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 5524 System.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\system64x Dynastyn.exe File opened for modification C:\Windows\system32\system64x\System.exe System.exe File opened for modification C:\Windows\system32\system64x System.exe File created C:\Windows\system32\system64x\System.exe Dynastyn.exe File opened for modification C:\Windows\system32\system64x\System.exe Dynastyn.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1844 schtasks.exe 6076 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3004 Dynastyn.exe Token: SeDebugPrivilege 5524 System.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5524 System.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1844 3004 Dynastyn.exe 88 PID 3004 wrote to memory of 1844 3004 Dynastyn.exe 88 PID 3004 wrote to memory of 5524 3004 Dynastyn.exe 90 PID 3004 wrote to memory of 5524 3004 Dynastyn.exe 90 PID 5524 wrote to memory of 6076 5524 System.exe 93 PID 5524 wrote to memory of 6076 5524 System.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dynastyn.exe"C:\Users\Admin\AppData\Local\Temp\Dynastyn.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System.exe" /sc ONLOGON /tr "C:\Windows\system32\system64x\System.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1844
-
-
C:\Windows\system32\system64x\System.exe"C:\Windows\system32\system64x\System.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5524 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System.exe" /sc ONLOGON /tr "C:\Windows\system32\system64x\System.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:6076
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:468
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD57278f8e052dfce0ab3b0e26342df90c7
SHA1b8e1a85020c3bc897bee6d2dfa2b0b7a0066a877
SHA256370e43173ca787e6fdb25e366832b962e7361842a8c935275ea10e996a1e65dc
SHA512d8dfc255717d1756ae67720e17d21098c20ea62ddf2fd4ecc2eb45ce228c12bce655b7754879a834850b9ff831fa58b66daed54d69f869983473b20fbacd11f4