Analysis

  • max time kernel
    114s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 15:33

General

  • Target

    Quasar v1.4.1/Quasar.exe

  • Size

    1.2MB

  • MD5

    12ebf922aa80d13f8887e4c8c5e7be83

  • SHA1

    7f87a80513e13efd45175e8f2511c2cd17ff51e8

  • SHA256

    43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

  • SHA512

    fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

  • SSDEEP

    12288:IwPs012cBBBYiL9l/bFfpBBBBBBBBBBBBcA:jBBBYiLvzFfpBBBBBBBBBBBBcA

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe
    "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" /select, "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12"
      2⤵
        PID:1324
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4504
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1168

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

        Filesize

        28KB

        MD5

        04336347583320199d54e09f525541b0

        SHA1

        a6e3c3e4176875d7bfe302bf2b4b0e672aa27111

        SHA256

        2a643939235e95064482b3e731498765fd7c6fe71f14e6817fb13f3da5afe9d8

        SHA512

        5ddddabe236c54179cac2b1a4a007f661a9f6d77a45699d9b001ab70ce58e392687cc3b4a4dd16c5fd9772291effdba124eaba0d7322e8f2dab5536ddca52f15

      • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Profiles\Default.xml

        Filesize

        1017B

        MD5

        529a5f928e2b3bb21f395b97ddffdc5c

        SHA1

        1239c3c308ca6f4a3cc2b8a9c5ee99f79a80db18

        SHA256

        405b6749e56ba42d3835ffff4efef6c81c53a81aae016a4100a363ffd9e65ce1

        SHA512

        c60418000ae67684323481f3fc9c40423d92fba7c56a19bab49c6d27d937bd7421b72fc0fa5ab7c5e4733bbedce42599e2da56da30a8981b8c19e9ea71437e39

      • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12

        Filesize

        4KB

        MD5

        d55626e75f464324b6b2ca26ee19b87d

        SHA1

        a91c42f44934607625a24a0212fa59d65b69de77

        SHA256

        07a3f73f50b92c6f5d8331e0a965917e4731fd9abb248cccded787b443a1b17e

        SHA512

        96306d12a3e241d952bef3dfcd0775e4f0c7f67613a1315e3e0710605ddc501941b9d38f713260ff19127d28f513b010e0972286d713c04c29026a50d2c64a94

      • memory/4316-138-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-165-0x0000020A6BBE0000-0x0000020A6BC2C000-memory.dmp

        Filesize

        304KB

      • memory/4316-133-0x0000020A4C050000-0x0000020A4C188000-memory.dmp

        Filesize

        1.2MB

      • memory/4316-139-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-140-0x0000020A6A4B0000-0x0000020A6A7DE000-memory.dmp

        Filesize

        3.2MB

      • memory/4316-136-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-162-0x0000020A698C0000-0x0000020A698D8000-memory.dmp

        Filesize

        96KB

      • memory/4316-163-0x0000020A6BB90000-0x0000020A6BBE0000-memory.dmp

        Filesize

        320KB

      • memory/4316-164-0x0000020A6BCA0000-0x0000020A6BD52000-memory.dmp

        Filesize

        712KB

      • memory/4316-137-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-170-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-171-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-135-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-174-0x0000020A6D520000-0x0000020A6D53A000-memory.dmp

        Filesize

        104KB

      • memory/4316-173-0x0000020A6DBE0000-0x0000020A6DC3E000-memory.dmp

        Filesize

        376KB

      • memory/4316-134-0x0000020A4C510000-0x0000020A4C526000-memory.dmp

        Filesize

        88KB

      • memory/4316-250-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB

      • memory/4316-251-0x0000020A665F0000-0x0000020A66600000-memory.dmp

        Filesize

        64KB