Analysis Overview
SHA256
e51a6cc27a8e9f21f56404bcf479978db71825bd61ed6eaf4570b5d64edbe2a2
Threat Level: Known bad
The file 1f8f68e7623630103601f6235e9c94a6.bin was found to be: Known bad.
Malicious Activity Summary
Quasar family
Quasar payload
Quasar RAT
Executes dropped EXE
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-01-23 14:04
Signatures
Quasar family
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-01-23 14:04
Reported
2023-01-23 14:07
Platform
win7-20220812-en
Max time kernel
138s
Max time network
151s
Command Line
Signatures
Quasar RAT
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe
"C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe"
C:\Windows\system32\schtasks.exe
"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe" /rl HIGHEST /f
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
C:\Windows\system32\schtasks.exe
"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
Network
| Country | Destination | Domain | Proto |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 192.168.1.237:1290 | tcp |
Files
memory/1392-54-0x0000000000D20000-0x0000000000DA4000-memory.dmp
memory/1392-55-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmp
memory/952-56-0x0000000000000000-mapping.dmp
memory/1688-57-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
| MD5 | 1f8f68e7623630103601f6235e9c94a6 |
| SHA1 | 3c32c376b1be12d1f9df117eb8435804548c02c8 |
| SHA256 | 76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591 |
| SHA512 | c93ba03f50602919a8355334c1450fb9f57aeb432027e53c458195d7dfbdc3940d042e136eb3ace24cd76c1ffbd359be05582893fc0e53f5fe764c8c32fe6631 |
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
| MD5 | 1f8f68e7623630103601f6235e9c94a6 |
| SHA1 | 3c32c376b1be12d1f9df117eb8435804548c02c8 |
| SHA256 | 76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591 |
| SHA512 | c93ba03f50602919a8355334c1450fb9f57aeb432027e53c458195d7dfbdc3940d042e136eb3ace24cd76c1ffbd359be05582893fc0e53f5fe764c8c32fe6631 |
memory/1688-60-0x0000000000BC0000-0x0000000000C44000-memory.dmp
memory/1348-62-0x0000000000000000-mapping.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-01-23 14:04
Reported
2023-01-23 14:07
Platform
win10v2004-20220812-en
Max time kernel
144s
Max time network
152s
Command Line
Signatures
Quasar RAT
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | N/A |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4616 wrote to memory of 4844 | N/A | C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe | C:\Windows\SYSTEM32\schtasks.exe |
| PID 4616 wrote to memory of 4844 | N/A | C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe | C:\Windows\SYSTEM32\schtasks.exe |
| PID 4616 wrote to memory of 3788 | N/A | C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe |
| PID 4616 wrote to memory of 3788 | N/A | C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe |
| PID 3788 wrote to memory of 4264 | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | C:\Windows\SYSTEM32\schtasks.exe |
| PID 3788 wrote to memory of 4264 | N/A | C:\Users\Admin\AppData\Roaming\SubDir\Client.exe | C:\Windows\SYSTEM32\schtasks.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe
"C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe"
C:\Windows\SYSTEM32\schtasks.exe
"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591.exe" /rl HIGHEST /f
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
C:\Windows\SYSTEM32\schtasks.exe
"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
Network
| Country | Destination | Domain | Proto |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 8.238.23.254:80 | tcp | |
| N/A | 8.238.23.254:80 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 51.116.253.170:443 | tcp | |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 93.184.220.29:80 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 192.168.1.237:1290 | tcp | |
| N/A | 192.168.1.237:1290 | tcp |
Files
memory/4616-132-0x0000000000970000-0x00000000009F4000-memory.dmp
memory/4616-133-0x00007FFB54A80000-0x00007FFB55541000-memory.dmp
memory/4844-134-0x0000000000000000-mapping.dmp
memory/3788-135-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
| MD5 | 1f8f68e7623630103601f6235e9c94a6 |
| SHA1 | 3c32c376b1be12d1f9df117eb8435804548c02c8 |
| SHA256 | 76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591 |
| SHA512 | c93ba03f50602919a8355334c1450fb9f57aeb432027e53c458195d7dfbdc3940d042e136eb3ace24cd76c1ffbd359be05582893fc0e53f5fe764c8c32fe6631 |
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
| MD5 | 1f8f68e7623630103601f6235e9c94a6 |
| SHA1 | 3c32c376b1be12d1f9df117eb8435804548c02c8 |
| SHA256 | 76257feb8d753a419e11bd0672eac3d236ac990d8ba8baf7ec44c5f1f3eac591 |
| SHA512 | c93ba03f50602919a8355334c1450fb9f57aeb432027e53c458195d7dfbdc3940d042e136eb3ace24cd76c1ffbd359be05582893fc0e53f5fe764c8c32fe6631 |
memory/4616-138-0x00007FFB54A80000-0x00007FFB55541000-memory.dmp
memory/3788-139-0x00007FFB54A80000-0x00007FFB55541000-memory.dmp
memory/4264-140-0x0000000000000000-mapping.dmp
memory/3788-141-0x000000001C910000-0x000000001C960000-memory.dmp
memory/3788-142-0x000000001CA20000-0x000000001CAD2000-memory.dmp
memory/3788-143-0x00007FFB54A80000-0x00007FFB55541000-memory.dmp