Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe
Resource
win7-20230621-en
General
-
Target
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe
-
Size
11.3MB
-
MD5
7b79bbfe338448b0de666215060d2cbc
-
SHA1
d8ca513e1e85e1a8dd6a81824f86064fad19419a
-
SHA256
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03
-
SHA512
e621286081db8ea041aaf148b233d52d8c4fdfd5ef0fa5327e17622ff3e19d8c6b6c25881b3f396e93c7aaacd0ed3e3baca7be59a508a5232534e3f777a99e50
-
SSDEEP
196608:ChTb9B0BPrDz4pxgZZPy5RmStgxb/z6FDiSJXqeUh4mT+uFk8spbVgo87e8YU:sTb9epDz4MZZ4RmxYDiScfhHjeV+vK8Y
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.237:4782
08ac4250-96f9-44da-b030-99dcc4597b28
-
encryption_key
D43A8C9C8C9A74741CBEA4F1A01C53C2F8DF8AC2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3472-145-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe Token: SeDebugPrivilege 3472 RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3472 RegAsm.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3472 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91 PID 3028 wrote to memory of 3472 3028 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe"C:\Users\Admin\AppData\Local\Temp\150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3472
-