Malware Analysis Report

2025-04-14 05:07

Sample ID 230123-pcnm1seg4s
Target 2
SHA256 14df5d1e4b0be12a769c1c8ba950c4c2a192cc4f145dbe9decec59bf2706788b
Tags
quasar office04 spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

14df5d1e4b0be12a769c1c8ba950c4c2a192cc4f145dbe9decec59bf2706788b

Threat Level: Known bad

The file 2 was found to be: Known bad.

Malicious Activity Summary

quasar office04 spyware trojan

Quasar RAT

Quasar payload

Quasar family

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-01-23 12:11

Signatures

Quasar family

quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-01-23 12:11

Reported

2023-01-23 12:13

Platform

win7-20221111-en

Max time kernel

137s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2.exe

"C:\Users\Admin\AppData\Local\Temp\2.exe"

Network

Country Destination Domain Proto
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp

Files

memory/1056-54-0x0000000001310000-0x00000000015D0000-memory.dmp

memory/1056-55-0x000007FEFC471000-0x000007FEFC473000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-01-23 12:11

Reported

2023-01-23 12:13

Platform

win10v2004-20221111-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2.exe

"C:\Users\Admin\AppData\Local\Temp\2.exe"

Network

Country Destination Domain Proto
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 93.184.221.240:80 tcp
N/A 93.184.221.240:80 tcp
N/A 20.42.73.26:443 tcp
N/A 104.80.225.205:443 tcp
N/A 93.184.221.240:80 tcp
N/A 93.184.221.240:80 tcp
N/A 93.184.221.240:80 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp
N/A 161.97.148.204:1604 tcp

Files

memory/496-132-0x0000000000E30000-0x00000000010F0000-memory.dmp

memory/496-133-0x00007FF852980000-0x00007FF853441000-memory.dmp

memory/496-134-0x000000001D390000-0x000000001D3E0000-memory.dmp

memory/496-135-0x000000001D4A0000-0x000000001D552000-memory.dmp

memory/496-136-0x00007FF852980000-0x00007FF853441000-memory.dmp