Edit tour
Windows
Analysis Report
5fr5gthkjdg71.exe
Overview
General Information
Detection
Quasar, R77 RootKit
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Disable power options
Sigma detected: Stop EventLog
Sigma detected: Stop multiple services
Yara detected Quasar RAT
Yara detected R77 RootKit
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Protects its processes via BreakOnTermination flag
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Suspicious powershell command line found
Uses Register-ScheduledTask to add task schedules
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- 5fr5gthkjdg71.exe (PID: 7452 cmdline:
"C:\Users\ user\Deskt op\5fr5gth kjdg71.exe " MD5: 13B0DEC8A2C9291EC13CA9D0F1A98B33) - gfiKDLgr58thy4d.exe (PID: 7528 cmdline:
"C:\Users\ user\Deskt op\gfiKDLg r58thy4d.e xe" MD5: 952F360A4651F948BE3A673178631641) - powershell.exe (PID: 7564 cmdline:
C:\Windows \system32\ WindowsPow erShell\v1 .0\powersh ell.exe Ad d-MpPrefer ence -Excl usionPath @($env:Use rProfile, $env:Progr amData) -E xclusionEx tension '. exe' -Forc e MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7580 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 8148 cmdline:
C:\Windows \system32\ cmd.exe /c wusa /uni nstall /kb :890830 /q uiet /nore start MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7220 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wusa.exe (PID: 916 cmdline:
wusa /unin stall /kb: 890830 /qu iet /nores tart MD5: FBDA2B8987895780375FE0E6254F6198) - sc.exe (PID: 8172 cmdline:
C:\Windows \system32\ sc.exe sto p UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 7208 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 3912 cmdline:
C:\Windows \system32\ sc.exe sto p WaaSMedi cSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 2492 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 7460 cmdline:
C:\Windows \system32\ sc.exe sto p wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 7524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 7872 cmdline:
C:\Windows \system32\ sc.exe sto p bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 7960 cmdline:
C:\Windows \system32\ sc.exe sto p dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - powercfg.exe (PID: 7748 cmdline:
C:\Windows \system32\ powercfg.e xe /x -hib ernate-tim eout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - conhost.exe (PID: 7724 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 7700 cmdline:
C:\Windows \system32\ powercfg.e xe /x -hib ernate-tim eout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - conhost.exe (PID: 8108 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 7836 cmdline:
C:\Windows \system32\ powercfg.e xe /x -sta ndby-timeo ut-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - conhost.exe (PID: 8040 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 7852 cmdline:
C:\Windows \system32\ powercfg.e xe /x -sta ndby-timeo ut-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - conhost.exe (PID: 7636 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - dialer.exe (PID: 7680 cmdline:
C:\Windows \system32\ dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93) - winlogon.exe (PID: 552 cmdline:
winlogon.e xe MD5: F8B41A1B3E569E7E6F990567F21DCE97) - kaptsegthwf.exe (PID: 7488 cmdline:
C:\Program Data\mxerg olzfguk\ka ptsegthwf. exe MD5: 952F360A4651F948BE3A673178631641) - powershell.exe (PID: 7376 cmdline:
C:\Windows \system32\ WindowsPow erShell\v1 .0\powersh ell.exe Ad d-MpPrefer ence -Excl usionPath @($env:Use rProfile, $env:Progr amData) -E xclusionEx tension '. exe' -Forc e MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 7744 cmdline:
C:\Windows \system32\ sc.exe del ete "WAGDK RVZ" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 7848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 5848 cmdline:
C:\Windows \system32\ sc.exe cre ate "WAGDK RVZ" binpa th= "C:\Pr ogramData\ mxergolzfg uk\kaptseg thwf.exe" start= "au to" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 1016 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 7372 cmdline:
C:\Windows \system32\ sc.exe sto p eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 6096 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 5676 cmdline:
C:\Windows \system32\ sc.exe sta rt "WAGDKR VZ" MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - conhost.exe (PID: 1396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - GR55Qg1hth.exe (PID: 7540 cmdline:
"C:\Users\ user\Deskt op\GR55Qg1 hth.exe" MD5: 8E40252356A6FB3F8F52D1EFFA2C2C3C) - powershell.exe (PID: 7588 cmdline:
powershell Add-MpPre ference -E xclusionPa th @($env: UserProfil e, $env:Pr ogramFiles ) -Force MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7604 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 8124 cmdline:
cmd /c sc stop UsoSv c & sc sto p WaaSMedi cSvc & sc stop wuaus erv & sc s top bits & sc stop d osvc & reg delete "H KLM\SYSTEM \CurrentCo ntrolSet\S ervices\Us oSvc" /f & reg delet e "HKLM\SY STEM\Curre ntControlS et\Service s\WaaSMedi cSvc" /f & reg delet e "HKLM\SY STEM\Curre ntControlS et\Service s\wuauserv " /f & reg delete "H KLM\SYSTEM \CurrentCo ntrolSet\S ervices\bi ts" /f & r eg delete "HKLM\SYST EM\Current ControlSet \Services\ dosvc" /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8140 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 1396 cmdline:
sc stop Us oSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 7500 cmdline:
sc stop Wa aSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 7868 cmdline:
sc stop wu auserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 4040 cmdline:
sc stop bi ts MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - sc.exe (PID: 7972 cmdline:
sc stop do svc MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - reg.exe (PID: 7672 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \UsoSvc" / f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 7216 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \WaaSMedic Svc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 7244 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \wuauserv" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 7248 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \bits" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 3624 cmdline:
reg delete "HKLM\SYS TEM\Curren tControlSe t\Services \dosvc" /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - cmd.exe (PID: 8132 cmdline:
cmd /c pow ercfg /x - hibernate- timeout-ac 0 & power cfg /x -hi bernate-ti meout-dc 0 & powercf g /x -stan dby-timeou t-ac 0 & p owercfg /x -standby- timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 8164 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 2500 cmdline:
powercfg / x -hiberna te-timeout -ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 7480 cmdline:
powercfg / x -hiberna te-timeout -dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 7520 cmdline:
powercfg / x -standby -timeout-a c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 7876 cmdline:
powercfg / x -standby -timeout-d c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powershell.exe (PID: 8156 cmdline:
powershell <#tkmebyo kj#> IF((N ew-Object Security.P rincipal.W indowsPrin cipal([Sec urity.Prin cipal.Wind owsIdentit y]::GetCur rent())).I sInRole([S ecurity.Pr incipal.Wi ndowsBuilt InRole]::A dministrat or)) { IF( [System.En vironment] ::OSVersio n.Version -lt [Syste m.Version] "6.2") { " schtasks / create /f /sc onlogo n /rl high est /ru 'S ystem' /tn 'Barac' / tr '''C:\P rogram Fil es\Cuis\bo n\Bara.exe '''" } Els e { Regist er-Schedul edTask -Ac tion (New- ScheduledT askAction -Execute ' C:\Program Files\Cui s\bon\Bara .exe') -Tr igger (New -Scheduled TaskTrigge r -AtStart up) -Setti ngs (New-S cheduledTa skSettings Set -Allow StartIfOnB atteries - DisallowHa rdTerminat e -DontSto pIfGoingOn Batteries -DontStopO nIdleEnd - ExecutionT imeLimit ( New-TimeSp an -Days 1 000)) -Tas kName 'Bar ac' -User 'System' - RunLevel ' Highest' - Force; } } Else { re g add "HKC U\SOFTWARE \Microsoft \Windows\C urrentVers ion\Run" / v "Barac" /t REG_SZ /f /d 'C:\ Program Fi les\Cuis\b on\Bara.ex e' } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 8180 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - F4R5fd8grr.exe (PID: 7548 cmdline:
"C:\Users\ user\Deskt op\F4R5fd8 grr.exe" MD5: EA001F076677C9B0DD774AE670EFDF63) - schtasks.exe (PID: 7864 cmdline:
"schtasks" /create / tn "3dfx S tartup" /s c ONLOGON /tr "C:\Us ers\user\D esktop\F4R 5fd8grr.ex e" /rl HIG HEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 7872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 7880 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Client.exe (PID: 7916 cmdline:
"C:\Users\ user\AppDa ta\Roaming \SubDir\Cl ient.exe" MD5: EA001F076677C9B0DD774AE670EFDF63) - schtasks.exe (PID: 7960 cmdline:
"schtasks" /create / tn "3dfx S tartup" /s c ONLOGON /tr "C:\Us ers\user\A ppData\Roa ming\SubDi r\Client.e xe" /rl HI GHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 7968 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 2020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- F4R5fd8grr.exe (PID: 7952 cmdline:
C:\Users\u ser\Deskto p\F4R5fd8g rr.exe MD5: EA001F076677C9B0DD774AE670EFDF63)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Quasar RAT, QuasarRAT | Quasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
r77, r77 Rootkit | According to the author, r77 is a ring 3 rootkit that hides everything: * Files, directories* Processes & CPU usage* Registry keys & values* Services* TCP & UDP connections* Junctions, named pipes, scheduled tasks | No Attribution |
{"Version": "1.4.0", "Host:Port": "185.148.3.216:4000;", "SubDirectory": "SubDir", "InstallName": "Client.exe", "MutexName": "c3557859-56ac-475e-b44d-e1b60c20d0d0", "Tag": "4Drun", "LogDirectoryName": "Logs"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth |
| |
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
| |
MALWARE_Win_QuasarStealer | Detects Quasar infostealer | ditekshen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
MAL_QuasarRAT_May19_1 | Detects QuasarRAT malware | Florian Roth |
| |
Vermin_Keylogger_Jan18_1 | Detects Vermin Keylogger | Florian Roth |
| |
INDICATOR_SUSPICIOUS_GENInfoStealer | Detects executables containing common artifcats observed in infostealers | ditekSHen |
| |
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_R77RootKit | Yara detected R77 RootKit | Joe Security | ||
Windows_Rootkit_R77_5bab748b | unknown | unknown |
| |
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_R77RootKit | Yara detected R77 RootKit | Joe Security | ||
Windows_Rootkit_R77_5bab748b | unknown | unknown |
| |
Click to see the 14 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_R77RootKit | Yara detected R77 RootKit | Joe Security | ||
Windows_Rootkit_R77_5bab748b | unknown | unknown |
| |
JoeSecurity_R77RootKit | Yara detected R77 RootKit | Joe Security | ||
Windows_Rootkit_R77_5bab748b | unknown | unknown |
| |
JoeSecurity_R77RootKit | Yara detected R77 RootKit | Joe Security | ||
Click to see the 25 entries |
Change of critical system settings |
---|
Source: | Author: Joe Security: |
Operating System Destruction |
---|
Source: | Author: Joe Security: |
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |