Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/12/2022, 09:51
Behavioral task
behavioral1
Sample
QuasarAplicativo.exe
Resource
win7-20220901-en
General
-
Target
QuasarAplicativo.exe
-
Size
502KB
-
MD5
bbd0db3230e57aeb7ca23e59aadf0134
-
SHA1
fdda0bfd08bbd74557dd878bda12f05368befb7d
-
SHA256
741a3f8b91ad8ef7bf2936bafddb95200b0f3083a6933d1d82c278baaa6ec9c7
-
SHA512
4393b5dcac40f0b36bf85e50f66ed299a95c298b5c8e4853aae8e5f84ab7d2cb64a989728b21135e2730afaddd60002872e517e8b67b68085f97345ff4a6baf3
-
SSDEEP
6144:VTEgdc0YpXAGbgiIN2RSBuSBtPB+a9VIvyTcEi9b8F9vkDC+ROcTR32:VTEgdfYlbgRljSCN8CQOcd2
Malware Config
Extracted
quasar
1.4.0
Office04
flingmodder-53370.portmap.io:53370
c16cce68-0a86-440c-89b1-c088c1c8b4cb
-
encryption_key
9BFDFBA45AE2C2C16DA4EEEA02438784B89CACC0
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
windows
Signatures
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/memory/1468-54-0x0000000001080000-0x0000000001104000-memory.dmp family_quasar behavioral1/files/0x000a0000000126c8-58.dat family_quasar behavioral1/files/0x000a0000000126c8-59.dat family_quasar behavioral1/memory/1544-60-0x0000000000C40000-0x0000000000CC4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1544 svchost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1160 schtasks.exe 1648 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1468 QuasarAplicativo.exe Token: SeDebugPrivilege 1544 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1544 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1160 1468 QuasarAplicativo.exe 27 PID 1468 wrote to memory of 1160 1468 QuasarAplicativo.exe 27 PID 1468 wrote to memory of 1160 1468 QuasarAplicativo.exe 27 PID 1468 wrote to memory of 1544 1468 QuasarAplicativo.exe 29 PID 1468 wrote to memory of 1544 1468 QuasarAplicativo.exe 29 PID 1468 wrote to memory of 1544 1468 QuasarAplicativo.exe 29 PID 1544 wrote to memory of 1648 1544 svchost.exe 30 PID 1544 wrote to memory of 1648 1544 svchost.exe 30 PID 1544 wrote to memory of 1648 1544 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\QuasarAplicativo.exe"C:\Users\Admin\AppData\Local\Temp\QuasarAplicativo.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\QuasarAplicativo.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1160
-
-
C:\Users\Admin\AppData\Roaming\windows\svchost.exe"C:\Users\Admin\AppData\Roaming\windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svchost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows\svchost.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1648
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502KB
MD5bbd0db3230e57aeb7ca23e59aadf0134
SHA1fdda0bfd08bbd74557dd878bda12f05368befb7d
SHA256741a3f8b91ad8ef7bf2936bafddb95200b0f3083a6933d1d82c278baaa6ec9c7
SHA5124393b5dcac40f0b36bf85e50f66ed299a95c298b5c8e4853aae8e5f84ab7d2cb64a989728b21135e2730afaddd60002872e517e8b67b68085f97345ff4a6baf3
-
Filesize
502KB
MD5bbd0db3230e57aeb7ca23e59aadf0134
SHA1fdda0bfd08bbd74557dd878bda12f05368befb7d
SHA256741a3f8b91ad8ef7bf2936bafddb95200b0f3083a6933d1d82c278baaa6ec9c7
SHA5124393b5dcac40f0b36bf85e50f66ed299a95c298b5c8e4853aae8e5f84ab7d2cb64a989728b21135e2730afaddd60002872e517e8b67b68085f97345ff4a6baf3