Resubmissions

17-06-2021 13:06

210617-e9xpw8561s 10

14-06-2021 16:02

210614-ntxhahdk2n 10

Analysis

  • max time kernel
    135s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    14-06-2021 16:02

General

  • Target

    DOCUMENT.EXE

  • Size

    1.1MB

  • MD5

    53964b6a40bfe2b10d36ba5e3d52966a

  • SHA1

    b459111cfb08fb42238e8421583cea226226e769

  • SHA256

    4dcc4adaa8c709d9db205c7267ec6da26930c0420aa54a77fed6217a9e6fdb98

  • SHA512

    03847f73a33a43bf84666db4a70167506d17b567f404098fd5237b704d30d1b35d7d50d2812a1f5c1b735bf13b915a448e3be9f8af9c3cc253f8ae6eacc3fea8

Score
10/10

Malware Config

Signatures

  • Quasar Payload 3 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE
    "C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE
      "C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE"
      2⤵
        PID:572
      • C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE
        "C:\Users\Admin\AppData\Local\Temp\DOCUMENT.EXE"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1384

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/840-59-0x00000000013C0000-0x00000000013C1000-memory.dmp

      Filesize

      4KB

    • memory/840-61-0x0000000000330000-0x000000000034E000-memory.dmp

      Filesize

      120KB

    • memory/840-62-0x0000000001300000-0x0000000001301000-memory.dmp

      Filesize

      4KB

    • memory/840-63-0x00000000050C0000-0x000000000516D000-memory.dmp

      Filesize

      692KB

    • memory/840-64-0x0000000001340000-0x00000000013BA000-memory.dmp

      Filesize

      488KB

    • memory/1384-65-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1384-66-0x000000000045819E-mapping.dmp

    • memory/1384-67-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1384-69-0x0000000004990000-0x0000000004991000-memory.dmp

      Filesize

      4KB