Analysis

  • max time kernel
    72s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-05-2023 22:15

General

  • Target

    Quasar v1.4.1/Quasar.exe.xml

  • Size

    176B

  • MD5

    c8cd50e8472b71736e6543f5176a0c12

  • SHA1

    0bd6549820de5a07ac034777b3de60021121405e

  • SHA256

    b44739eeff82db2b575a45b668893e2fe8fdd24a709cbf0554732fd3520b2190

  • SHA512

    6e8f77fcca5968788cc9f73c9543ce9ab7b416372bc681093aa8a3aad43af1f06c56fcbc296c7897a3654b86a6f9d0e8b0fe036677cf290957924377bc177d9f

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:82945 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4024

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    d22be18b7c2905da9dfb7125780ebd9a

    SHA1

    6e400874e9e107467b509cea0acff06c72b21344

    SHA256

    0addc0a88f33e6b4419b37cba0ee19fd8bab20ff1007eb26bca6b17f59dfd20c

    SHA512

    f9f07efdc888bf4489819e93e854b5b3e059a62180ac25c102a9e687a2e6a0c83fc2f480107e35a0a5e52846ee5e809a4d1d8af8c76155134cca2c6a5bda5405

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    938fac8b90a696ace4eca45b386a0730

    SHA1

    d34a0bed35311c4caf3c50a396e5c624b01629f4

    SHA256

    a4f0a9bd0e945949307a029d93c0e5b11d1318e0ffc8f44e78f8ff6a2c75696e

    SHA512

    c13506449e37ed42d3a4cdb96229e41442e85d5dfccaf8b21752eefc89176ff67ba5517ac4e11caa1d30ca3d7e2936cfffd683d76557eefd393623ef8b4cf88a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1
    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U6RLBIWS.cookie
    Filesize

    609B

    MD5

    5ede9644e4bfac6569c7c4bbacb92e8d

    SHA1

    7d35dec88e21532c6f4b3ce5d59ac720cf0da338

    SHA256

    fd19c94015e7efce86c7fab000202c707dff755f317c532ce310264615b63d8c

    SHA512

    58b5ca958196eb37686be3045c057fb120c68f51b880f88ab073e911e20840ca385ec7557e6eefd101c3b0e000e62c5bfbb54e2e4a0af45f7373e28f4112c8bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\U8D562XG.cookie
    Filesize

    242B

    MD5

    a04239e5170ed1d0552b2dd8e571d011

    SHA1

    5a91665f01efbf08c83d40f59756868137e7df3e

    SHA256

    c3cfd5b9a768463fdf4c56d80582a2297daac1f74b7ad32cdb9d0fce85a003ce

    SHA512

    9b5423c0a89bb6d43c3539020674ba2b64b9c6ce5d034fbd774b0d4107cf72fa3650033a2f327cef818484c5dfaf1814225a2666fed0f86b631bf09e14458333

  • memory/4048-123-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB

  • memory/4048-127-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB

  • memory/4048-126-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB

  • memory/4048-125-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB

  • memory/4048-124-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB

  • memory/4048-120-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB

  • memory/4048-122-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB

  • memory/4048-121-0x00007FF946410000-0x00007FF946420000-memory.dmp
    Filesize

    64KB