Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
15/01/2023, 17:53
Behavioral task
behavioral1
Sample
testating.exe
Resource
win7-20221111-en
5 signatures
150 seconds
General
-
Target
testating.exe
-
Size
502KB
-
MD5
1f8f68e7623630103601f6235e9c94a6
-
SHA1
3c32c376b1be12d1f9df117eb8435804548c02c8
-
SHA256
76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591
-
SHA512
c93ba03f50602919a8355334c1450fb9f57aeb432027e53c458195d7dfbdc3940d042e136eb3ace24cd76c1ffbd359be05582893fc0e53f5fe764c8c32fe6631
-
SSDEEP
6144:4TEgdc0YHXAGbgiIN2RSBWDR3Uz8sXKYF8MtcEnOb8F96rQ3u49JTxcTR32:4TEgdfYfbgnttr3pcreu4nTxcd2
Malware Config
Extracted
Family
quasar
Version
1.4.0
Botnet
Office04
C2
192.168.1.237:1290
Mutex
0cdb9102-24f8-4ed6-ba0c-d7625d69d684
Attributes
-
encryption_key
63E6BFBD5330A53154091A63A8847C4FAA484D23
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
2899
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1992-54-0x0000000000D00000-0x0000000000D84000-memory.dmp family_quasar -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1260 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 testating.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1260 1992 testating.exe 29 PID 1992 wrote to memory of 1260 1992 testating.exe 29 PID 1992 wrote to memory of 1260 1992 testating.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\testating.exe"C:\Users\Admin\AppData\Local\Temp\testating.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\testating.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:1260
-