Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-06-2024 19:28
General
-
Target
RatForKiooAdmin.exe
-
Size
3.4MB
-
MD5
eeaed02a0476fbf0bf9b87ba217a74ff
-
SHA1
ddc562254c09485c893befe0cd061a992e9ccf48
-
SHA256
ebad07fe74262b4dd7fcec476fa92560983112a94d5c4346b4d934a0f4f9f6f0
-
SHA512
ed426d7e8986c8ad5d6ae0d758dbac36ea663abbc6b1d5e420d4064e9ee43d46f1ae2248d58703842cfcca361ea7d911addecca70a18d5b451971f79df15a2e4
-
SSDEEP
98304:DvI22SsaNYfdPBldt6+dBcjHT6RJ6kdx:rd7jcB
Malware Config
Extracted
quasar
1.4.1
KIO
0.tcp.ngrok.io:16302
116e2822-047d-4b5c-ad10-563148a1a28e
-
encryption_key
C366BC97216329D1909524412E3ECB1EBC575D07
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4592-1-0x00000000001D0000-0x0000000000536000-memory.dmp family_quasar -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
Processes:
flow ioc 1 0.tcp.ngrok.io 5 0.tcp.ngrok.io 10 0.tcp.ngrok.io 11 0.tcp.ngrok.io 12 0.tcp.ngrok.io 13 0.tcp.ngrok.io 14 0.tcp.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 7 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 4004 PING.EXE 3836 PING.EXE 3748 PING.EXE 1872 PING.EXE 3760 PING.EXE 4712 PING.EXE 4040 PING.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
RatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exedescription pid process Token: SeDebugPrivilege 4592 RatForKiooAdmin.exe Token: SeDebugPrivilege 4992 RatForKiooAdmin.exe Token: SeDebugPrivilege 4016 RatForKiooAdmin.exe Token: SeDebugPrivilege 4640 RatForKiooAdmin.exe Token: SeDebugPrivilege 1388 RatForKiooAdmin.exe Token: SeDebugPrivilege 4228 RatForKiooAdmin.exe Token: SeDebugPrivilege 2256 RatForKiooAdmin.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
RatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exeRatForKiooAdmin.exepid process 4592 RatForKiooAdmin.exe 4992 RatForKiooAdmin.exe 4016 RatForKiooAdmin.exe 4640 RatForKiooAdmin.exe 1388 RatForKiooAdmin.exe 4228 RatForKiooAdmin.exe 2256 RatForKiooAdmin.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
RatForKiooAdmin.execmd.exeRatForKiooAdmin.execmd.exeRatForKiooAdmin.execmd.exeRatForKiooAdmin.execmd.exeRatForKiooAdmin.execmd.exeRatForKiooAdmin.execmd.exeRatForKiooAdmin.execmd.exedescription pid process target process PID 4592 wrote to memory of 3404 4592 RatForKiooAdmin.exe cmd.exe PID 4592 wrote to memory of 3404 4592 RatForKiooAdmin.exe cmd.exe PID 3404 wrote to memory of 3560 3404 cmd.exe chcp.com PID 3404 wrote to memory of 3560 3404 cmd.exe chcp.com PID 3404 wrote to memory of 1872 3404 cmd.exe PING.EXE PID 3404 wrote to memory of 1872 3404 cmd.exe PING.EXE PID 3404 wrote to memory of 4992 3404 cmd.exe RatForKiooAdmin.exe PID 3404 wrote to memory of 4992 3404 cmd.exe RatForKiooAdmin.exe PID 4992 wrote to memory of 496 4992 RatForKiooAdmin.exe cmd.exe PID 4992 wrote to memory of 496 4992 RatForKiooAdmin.exe cmd.exe PID 496 wrote to memory of 4984 496 cmd.exe chcp.com PID 496 wrote to memory of 4984 496 cmd.exe chcp.com PID 496 wrote to memory of 3760 496 cmd.exe PING.EXE PID 496 wrote to memory of 3760 496 cmd.exe PING.EXE PID 496 wrote to memory of 4016 496 cmd.exe RatForKiooAdmin.exe PID 496 wrote to memory of 4016 496 cmd.exe RatForKiooAdmin.exe PID 4016 wrote to memory of 3168 4016 RatForKiooAdmin.exe cmd.exe PID 4016 wrote to memory of 3168 4016 RatForKiooAdmin.exe cmd.exe PID 3168 wrote to memory of 4160 3168 cmd.exe chcp.com PID 3168 wrote to memory of 4160 3168 cmd.exe chcp.com PID 3168 wrote to memory of 4712 3168 cmd.exe PING.EXE PID 3168 wrote to memory of 4712 3168 cmd.exe PING.EXE PID 3168 wrote to memory of 4640 3168 cmd.exe RatForKiooAdmin.exe PID 3168 wrote to memory of 4640 3168 cmd.exe RatForKiooAdmin.exe PID 4640 wrote to memory of 1228 4640 RatForKiooAdmin.exe cmd.exe PID 4640 wrote to memory of 1228 4640 RatForKiooAdmin.exe cmd.exe PID 1228 wrote to memory of 3624 1228 cmd.exe chcp.com PID 1228 wrote to memory of 3624 1228 cmd.exe chcp.com PID 1228 wrote to memory of 4040 1228 cmd.exe PING.EXE PID 1228 wrote to memory of 4040 1228 cmd.exe PING.EXE PID 1228 wrote to memory of 1388 1228 cmd.exe RatForKiooAdmin.exe PID 1228 wrote to memory of 1388 1228 cmd.exe RatForKiooAdmin.exe PID 1388 wrote to memory of 1904 1388 RatForKiooAdmin.exe cmd.exe PID 1388 wrote to memory of 1904 1388 RatForKiooAdmin.exe cmd.exe PID 1904 wrote to memory of 4524 1904 cmd.exe chcp.com PID 1904 wrote to memory of 4524 1904 cmd.exe chcp.com PID 1904 wrote to memory of 4004 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 4004 1904 cmd.exe PING.EXE PID 1904 wrote to memory of 4228 1904 cmd.exe RatForKiooAdmin.exe PID 1904 wrote to memory of 4228 1904 cmd.exe RatForKiooAdmin.exe PID 4228 wrote to memory of 1488 4228 RatForKiooAdmin.exe cmd.exe PID 4228 wrote to memory of 1488 4228 RatForKiooAdmin.exe cmd.exe PID 1488 wrote to memory of 2660 1488 cmd.exe chcp.com PID 1488 wrote to memory of 2660 1488 cmd.exe chcp.com PID 1488 wrote to memory of 3836 1488 cmd.exe PING.EXE PID 1488 wrote to memory of 3836 1488 cmd.exe PING.EXE PID 1488 wrote to memory of 2256 1488 cmd.exe RatForKiooAdmin.exe PID 1488 wrote to memory of 2256 1488 cmd.exe RatForKiooAdmin.exe PID 2256 wrote to memory of 2904 2256 RatForKiooAdmin.exe cmd.exe PID 2256 wrote to memory of 2904 2256 RatForKiooAdmin.exe cmd.exe PID 2904 wrote to memory of 2488 2904 cmd.exe chcp.com PID 2904 wrote to memory of 2488 2904 cmd.exe chcp.com PID 2904 wrote to memory of 3748 2904 cmd.exe PING.EXE PID 2904 wrote to memory of 3748 2904 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gHRkqgkXERQt.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650013⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zlQqv5ybvxFy.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650015⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2XIujBCkW4Cl.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650017⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uvWURhmiXdLD.bat" "8⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650019⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\V8xtusGTjveW.bat" "10⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500111⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ag6YZMVqQQj9.bat" "12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500113⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"C:\Users\Admin\AppData\Local\Temp\RatForKiooAdmin.exe"13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\t2HQb2oaNpWg.bat" "14⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500115⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RatForKiooAdmin.exe.logFilesize
2KB
MD515eab799098760706ed95d314e75449d
SHA1273fb07e40148d5c267ca53f958c5075d24c4444
SHA25645030bd997f50bb52c481f7bc86fac5f375d08911bcc106b98d9d8f0c2ce9778
SHA51250c125e2a98740db0a0122d7f4de97c50d84623e800b3d3e173049c8e28ff0fbe4add7677bc56cb2228f78ed17522f67ae8f1b85f62824012414ce38ce0b500c
-
C:\Users\Admin\AppData\Local\Temp\2XIujBCkW4Cl.batFilesize
212B
MD518aad5854a44972f423bc8bc444d84ac
SHA18ce7d4507cef0b1fb625be014d9da605f6d66938
SHA256b3a60fe02f8fbf460dff670248e11bc7aa62d9d4ae2c5076b3ad1aa1a0f5b056
SHA512dac47cbe092ff37cc53b56233412808794fda40d5c865fde27b28eb1219bc74dc2d1b675a40aa16b90996b2c341b92d5bfd0b5f4869c6efe9675c240a90297cd
-
C:\Users\Admin\AppData\Local\Temp\V8xtusGTjveW.batFilesize
212B
MD5b5826ddcbae2ebee426d484ad042a37b
SHA12fa3bab8588ec3f33ec11b7e260c01d76f37f0d9
SHA2568e9435c98d247a00aa11e04069d2859caedfd03089115d2e133fb25328d002e1
SHA512898b8e3c96c4ad67a835ffdd85ce3469c38e7720f7428fe70263695d17b6e2b7069bc42b817063bb03efd36321b1e9ffbf2306284836a47e6286589f4f6fce89
-
C:\Users\Admin\AppData\Local\Temp\ag6YZMVqQQj9.batFilesize
212B
MD53741481e943e83b9cd5cca3200f2b1c2
SHA143369a189e6abf450e13ba2b59324a11a704e3bf
SHA2567735747d2b42919fd4d3d37bfe25855640ec3a691f8ef51fbc1476512a95d8bc
SHA5129c0f9158394489f95a7b77931fc0bf0e5819aec5a535086e003072c35fa342a72ea9d979e49e2247fa134ac2daf32da09ec15ec049cc2d2797203a16a7443037
-
C:\Users\Admin\AppData\Local\Temp\gHRkqgkXERQt.batFilesize
212B
MD58cf193e64e19e7a65836760245b724ae
SHA1e73bf48106d0184107af4f62919e1d14331f393e
SHA256e22f104f93036e062655cc378fdb6a70edfb77add51cd10a00f15947cf297465
SHA5121cf3a7f030254343f97368ad235a0f317ad7be8a8a17dc420866c21f6eae1d967e1ff7815e66641034ce9124ecaf9618a1104d40fc4f22eac9df3e883195e216
-
C:\Users\Admin\AppData\Local\Temp\t2HQb2oaNpWg.batFilesize
212B
MD58d5bcc5aa07376d4c6053dc6e1f8fd43
SHA189dbaff288a4f8ee2c3363c9b571f9066fb6ed8e
SHA256cb722608073277b0f1417e37cd7e0f89162ae7939ba6ea9607bbf434a718dd8a
SHA512161aef1f35a5cd2ac09cdaedeeff38bb58352fb09e0b720032e65896269f2aab17bb066f199ac3214b4ce26d70d775d28710879f33b7c4b91e48151cad7dfe58
-
C:\Users\Admin\AppData\Local\Temp\uvWURhmiXdLD.batFilesize
212B
MD563044c8a3161441c333dc6aaab75cf21
SHA16c175c1f8a4f649de18e588f765fc2a0e00939cf
SHA256be0221e9a666e5a87d3c004dbafc462bcfab7f5742a6aff48ef2c6a76a35150d
SHA5121f1266e59b0dd7da01816035408078bb285810295c44b1fdbb140b8458bd8c3dca55af1524da4a4a995f1bfffd5764251fb8aef7b7164ea7e5d56fdae648b9bd
-
C:\Users\Admin\AppData\Local\Temp\zlQqv5ybvxFy.batFilesize
212B
MD5d607a2715302a84c42f4788af415a606
SHA1232b448d8666eb47ce2b1f756f1bce41238542f7
SHA2562e5fda574c0938f75fd1d554c1f03432a0a3811d28538ca5d4b8867261d5b0f4
SHA512c06ccfbfeb857dc3c10fe963256f63da2ac4ac491f61335fedd6e5f4471d8667a0978e5285171d1eb26e64471d541cefed5b6f262e88154bedfe830eaa3b2761
-
memory/4592-4-0x000000001B7B0000-0x000000001B862000-memory.dmpFilesize
712KB
-
memory/4592-10-0x00007FF8E5AD0000-0x00007FF8E6592000-memory.dmpFilesize
10.8MB
-
memory/4592-0-0x00007FF8E5AD3000-0x00007FF8E5AD5000-memory.dmpFilesize
8KB
-
memory/4592-3-0x000000001B220000-0x000000001B270000-memory.dmpFilesize
320KB
-
memory/4592-2-0x00007FF8E5AD0000-0x00007FF8E6592000-memory.dmpFilesize
10.8MB
-
memory/4592-1-0x00000000001D0000-0x0000000000536000-memory.dmpFilesize
3.4MB
-
memory/4992-16-0x00007FF8E5AD0000-0x00007FF8E6592000-memory.dmpFilesize
10.8MB
-
memory/4992-12-0x00007FF8E5AD0000-0x00007FF8E6592000-memory.dmpFilesize
10.8MB