Analysis
-
max time kernel
28s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/02/2023, 14:08
Behavioral task
behavioral1
Sample
bJ11.exe
Resource
win7-20221111-en
7 signatures
150 seconds
General
-
Target
bJ11.exe
-
Size
348KB
-
MD5
d001867ff938f296f1b03d98401833e4
-
SHA1
a84e1ce678534dee8f48c3fe1433420b17d3ac64
-
SHA256
5a741ef4cb97d9e31e89328404474eed99f685cf60bb63dcf86e7be4e4e9e269
-
SHA512
e50dd6a939e82ecccb15ed1c27ac2685eee1ffbf664d2c9b59e8e6b60602fe4f49c487f05135c6849c4f9a3d9a316576b01d28c366733a00983f2a4a6ff627ee
-
SSDEEP
6144:v46bPXhLApfpTCahJqLhQPcbWhhyBPVu0BXi2:AmhApvhJHnhiVu0BS2
Malware Config
Extracted
Family
quasar
Version
1.3.0.0
Botnet
xxxxxxxRC
C2
qsar1928.duckdns.org:2158
Mutex
QSR_MUTEX_sigOedjQb38nZ7vJ3Q
Attributes
-
encryption_key
hqEzPThiLx44k3QYmA1s
-
install_name
Java.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1364-54-0x00000000002B0000-0x000000000030E000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 924 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 bJ11.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1364 bJ11.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 924 1364 bJ11.exe 29 PID 1364 wrote to memory of 924 1364 bJ11.exe 29 PID 1364 wrote to memory of 924 1364 bJ11.exe 29 PID 1364 wrote to memory of 924 1364 bJ11.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bJ11.exe"C:\Users\Admin\AppData\Local\Temp\bJ11.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Java" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\bJ11.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:924
-