Malware Analysis Report

2025-04-14 05:06

Sample ID 230110-218djshh86
Target 4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d
SHA256 4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d
Tags
quasar office04 spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d

Threat Level: Known bad

The file 4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d was found to be: Known bad.

Malicious Activity Summary

quasar office04 spyware trojan

Quasar RAT

Quasar payload

Executes dropped EXE

Uses the VBS compiler for execution

Checks computer location settings

Looks up external IP address via web service

Suspicious use of SetThreadContext

Enumerates physical storage devices

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-01-10 23:04

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-01-10 23:04

Reported

2023-01-10 23:06

Platform

win10v2004-20221111-en

Max time kernel

73s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\systemx888.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe N/A

Uses the VBS compiler for execution

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 868 set thread context of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2216 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe C:\Users\Admin\AppData\Roaming\systemx888.exe
PID 2216 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe C:\Users\Admin\AppData\Roaming\systemx888.exe
PID 2216 wrote to memory of 868 N/A C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe C:\Users\Admin\AppData\Roaming\systemx888.exe
PID 868 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\SysWOW64\cmd.exe
PID 868 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\SysWOW64\cmd.exe
PID 868 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\SysWOW64\cmd.exe
PID 4412 wrote to memory of 5080 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 4412 wrote to memory of 5080 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 4412 wrote to memory of 5080 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\schtasks.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
PID 868 wrote to memory of 4152 N/A C:\Users\Admin\AppData\Roaming\systemx888.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe

"C:\Users\Admin\AppData\Local\Temp\4a181732e82bac9de2926c6982ff94b2f513e8751a76f6eb3bb9eba4f7634f3d.exe"

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Users\Admin\AppData\Roaming\systemx888.exe

"C:\Users\Admin\AppData\Roaming\systemx888.exe"

C:\Windows\SysWOW64\cmd.exe

"cmd" /C schtasks /create /tn \pGLCR /tr "C:\Users\Admin\AppData\Roaming\systemx888.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /f

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /tn \pGLCR /tr "C:\Users\Admin\AppData\Roaming\systemx888.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /f

C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"

Network

Country Destination Domain Proto
N/A 45.138.16.40:4782 tcp
N/A 8.8.8.8:53 tools.keycdn.com udp
N/A 185.172.148.96:443 tools.keycdn.com tcp
N/A 8.8.8.8:53 api.ipify.org udp
N/A 64.185.227.156:443 api.ipify.org tcp
N/A 20.50.201.200:443 tcp

Files

memory/2216-132-0x00000000002A0000-0x0000000000376000-memory.dmp

memory/868-133-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\systemx888.exe

MD5 d561a17252e9cbb698307f1142f4b524
SHA1 89490ef9113cad42253894332fb3efe033ca0ad3
SHA256 9599d3f669b050eda2ca52cf249766c0103d5d4ae3519e09bdeb6944cff31a0f
SHA512 da595d699140110db0614b104d53c8ba71f59ac510ef54f6f8a93fe70c7ac1825acc280d60bdb873544e164cfdcdb0adf1922a216c19a0f0aabaef8eb7a43264

C:\Users\Admin\AppData\Roaming\systemx888.exe

MD5 d561a17252e9cbb698307f1142f4b524
SHA1 89490ef9113cad42253894332fb3efe033ca0ad3
SHA256 9599d3f669b050eda2ca52cf249766c0103d5d4ae3519e09bdeb6944cff31a0f
SHA512 da595d699140110db0614b104d53c8ba71f59ac510ef54f6f8a93fe70c7ac1825acc280d60bdb873544e164cfdcdb0adf1922a216c19a0f0aabaef8eb7a43264

memory/868-136-0x0000000000220000-0x0000000000424000-memory.dmp

memory/868-137-0x0000000005190000-0x0000000005734000-memory.dmp

memory/4412-138-0x0000000000000000-mapping.dmp

memory/5080-139-0x0000000000000000-mapping.dmp

memory/4152-140-0x0000000000000000-mapping.dmp

memory/4152-141-0x0000000000400000-0x0000000000484000-memory.dmp

memory/4152-142-0x00000000053E0000-0x0000000005472000-memory.dmp

memory/4152-143-0x0000000005370000-0x000000000537A000-memory.dmp

memory/4152-144-0x0000000006ED0000-0x00000000074E8000-memory.dmp

memory/4152-145-0x0000000006980000-0x00000000069D0000-memory.dmp

memory/4152-146-0x0000000006BF0000-0x0000000006CA2000-memory.dmp

memory/4152-147-0x0000000007C60000-0x0000000007CC6000-memory.dmp