Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe
Resource
win7-20220414-en
General
-
Target
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe
-
Size
337KB
-
MD5
8674e8fd878a92e92a479b931235bb72
-
SHA1
dfc652402b4791b81379326b0881cd0a2e613169
-
SHA256
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3
-
SHA512
6d36b398d1f964b3b2f0ce5fdd1a0a04e7997b8fa8295912f31d4e26a50dee75197303df34d92915fa5bb57a5df4d486dcff7d312bd5064425cd27218b4e094c
Malware Config
Extracted
quasar
1.4.0.0
CEO
23.249.161.211:1714
ymuFePGjPK2s7dyOvO
-
encryption_key
H5mirEGEuwM1G7u6Z7Pb
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2352-142-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar -
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Drops startup file 1 IoCs
Processes:
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SYrSDt.url 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exedescription pid process target process PID 4776 set thread context of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exepid process 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe Token: SeDebugPrivilege 2352 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 2352 RegAsm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.execsc.exedescription pid process target process PID 4776 wrote to memory of 2276 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe csc.exe PID 4776 wrote to memory of 2276 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe csc.exe PID 4776 wrote to memory of 2276 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe csc.exe PID 2276 wrote to memory of 5036 2276 csc.exe cvtres.exe PID 2276 wrote to memory of 5036 2276 csc.exe cvtres.exe PID 2276 wrote to memory of 5036 2276 csc.exe cvtres.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe PID 4776 wrote to memory of 2352 4776 382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe"C:\Users\Admin\AppData\Local\Temp\382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\13atz3bm\13atz3bm.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9520.tmp" "c:\Users\Admin\AppData\Local\Temp\13atz3bm\CSCFCE88940FCC5434CB46173CA38AF183F.TMP"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\13atz3bm\13atz3bm.dllFilesize
7KB
MD5d77025a2b00a88e2e92e6fb2c58a21dc
SHA14caa7a512cc774adaac25dddaeed11d5d7af856f
SHA25628639096a03ad611411333b9c6d1d1bba49f71d553a71ae253efdd9d66cc2520
SHA51282f59991867d3cee0a86d443ff8ebcb939e6c0dd87b3eed1bd8c0070043043b832df9f3b198ae085324c8ee596d5f962eab3f3a07df5fbe67c3eb6c83311b018
-
C:\Users\Admin\AppData\Local\Temp\13atz3bm\13atz3bm.pdbFilesize
23KB
MD5e550984d1f58fedbf75104dbd5ef65c6
SHA123a7d9033394674a045c134dfa4deb491638cf40
SHA2563acb0ea0cac1ae64194c5d15cc12b25cc7fe6aa47e3e436ef76ef5bfc717dbc7
SHA512ef01165459161365b26e5ed799aa11152e099a8e8dcaf9979f5eda86270484f0ace81af437d84cfd8dfdc372a35beaf2e295dc021f26e255871ead6f040c55e5
-
C:\Users\Admin\AppData\Local\Temp\RES9520.tmpFilesize
1KB
MD5f4fa3c8d493cf5512dc6c749fdc42a00
SHA17eb89e2a9c185c602926ad055cb91854c14ccea2
SHA25649e65d5a4d3af8a13e80eacff9d6eb9e28fb418d9ae2faacdc0261428a738a72
SHA5123646a3f698fc38d98d31041ec19213aec5bfae32905b6c27adbebaab5158c4c16a86960afb833f694561453feb9e8954761a53e94b20eca520e7ca8c28daa4a3
-
\??\c:\Users\Admin\AppData\Local\Temp\13atz3bm\13atz3bm.0.csFilesize
5KB
MD51270db283d14131c79bfa21e6bd37dec
SHA1fc867965ea8a68a2486f1d41a2ab85a92c665ed2
SHA256be757d33334bc1f1a8b642c0bda3c20d027bd9de014e17b1f5811b430d7262dd
SHA51273d888e7252a3e20d00fe8dd56e709bf5c5e0b0a076c221ea27ec5def6939978697dce83433b9c49be9eac7228a2619dca3fa138c1d4e49f38acc952668b4be9
-
\??\c:\Users\Admin\AppData\Local\Temp\13atz3bm\13atz3bm.cmdlineFilesize
312B
MD5d14a2bb2a90840d5c97a2e313edb30d7
SHA1ab066d7079c444dc408ce0ce1795d887f89f2aae
SHA256456e64378264b3e1c56584f1d9cfd83d6c186f18905e83f28d3472b2e4ebeef6
SHA5123512cd4b62df70cab91ae82bb396d12f7d1989235c439062d2c9d546d0b025fffe4b1e82e35138fa0884696334d30976e0322ca6cfb857df59e7a7691405df60
-
\??\c:\Users\Admin\AppData\Local\Temp\13atz3bm\CSCFCE88940FCC5434CB46173CA38AF183F.TMPFilesize
1KB
MD512549247873309c615e6cee6643d32fe
SHA1f81192fee24aec108af472edacc44392244d1b51
SHA256ebc16c79cd4958ea066f339955c52cf93cb66422699d19875a87c4bbc00d6020
SHA512b8ea5ada8e36877d97dc02870c94b062f6a34ba0c6350f0d090b5b97bc9648daa8dcab42b292751b376e4899294cf7915ce54266d035987395dd3efffd4a2b7d
-
memory/2276-131-0x0000000000000000-mapping.dmp
-
memory/2352-142-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/2352-141-0x0000000000000000-mapping.dmp
-
memory/2352-143-0x0000000005B70000-0x0000000006114000-memory.dmpFilesize
5.6MB
-
memory/2352-144-0x0000000005810000-0x0000000005876000-memory.dmpFilesize
408KB
-
memory/2352-145-0x0000000005B30000-0x0000000005B42000-memory.dmpFilesize
72KB
-
memory/2352-146-0x0000000006920000-0x000000000695C000-memory.dmpFilesize
240KB
-
memory/2352-147-0x0000000006E90000-0x0000000006E9A000-memory.dmpFilesize
40KB
-
memory/4776-139-0x0000000004C00000-0x0000000004C92000-memory.dmpFilesize
584KB
-
memory/4776-140-0x0000000005250000-0x00000000052EC000-memory.dmpFilesize
624KB
-
memory/4776-130-0x00000000001F0000-0x000000000024A000-memory.dmpFilesize
360KB
-
memory/5036-134-0x0000000000000000-mapping.dmp