Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 14:05
Static task
static1
Behavioral task
behavioral1
Sample
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe
Resource
win7-20230621-en
General
-
Target
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe
-
Size
11.3MB
-
MD5
7b79bbfe338448b0de666215060d2cbc
-
SHA1
d8ca513e1e85e1a8dd6a81824f86064fad19419a
-
SHA256
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03
-
SHA512
e621286081db8ea041aaf148b233d52d8c4fdfd5ef0fa5327e17622ff3e19d8c6b6c25881b3f396e93c7aaacd0ed3e3baca7be59a508a5232534e3f777a99e50
-
SSDEEP
196608:ChTb9B0BPrDz4pxgZZPy5RmStgxb/z6FDiSJXqeUh4mT+uFk8spbVgo87e8YU:sTb9epDz4MZZ4RmxYDiScfhHjeV+vK8Y
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.237:4782
08ac4250-96f9-44da-b030-99dcc4597b28
-
encryption_key
D43A8C9C8C9A74741CBEA4F1A01C53C2F8DF8AC2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4820-145-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Suspicious use of SetThreadContext 1 IoCs
Processes:
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exedescription pid process target process PID 1984 set thread context of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe Token: SeDebugPrivilege 4820 RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
RegAsm.exepid process 4820 RegAsm.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
RegAsm.exepid process 4820 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exedescription pid process target process PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe PID 1984 wrote to memory of 4820 1984 150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe"C:\Users\Admin\AppData\Local\Temp\150169f8a2862e4c977fe99b4d6a1af4e2169deae6d76d64434af35633c01e03.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1984-133-0x0000000000CE0000-0x0000000001836000-memory.dmpFilesize
11.3MB
-
memory/1984-134-0x0000000006330000-0x000000000634A000-memory.dmpFilesize
104KB
-
memory/1984-135-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/1984-136-0x0000000005CE0000-0x0000000005CE8000-memory.dmpFilesize
32KB
-
memory/1984-137-0x0000000007B70000-0x0000000007BE6000-memory.dmpFilesize
472KB
-
memory/1984-138-0x00000000093F0000-0x00000000093F8000-memory.dmpFilesize
32KB
-
memory/1984-139-0x0000000009630000-0x0000000009638000-memory.dmpFilesize
32KB
-
memory/1984-140-0x000000000A3D0000-0x000000000A3EE000-memory.dmpFilesize
120KB
-
memory/1984-141-0x000000000C0C0000-0x000000000C664000-memory.dmpFilesize
5.6MB
-
memory/1984-142-0x000000000BBB0000-0x000000000BC42000-memory.dmpFilesize
584KB
-
memory/1984-143-0x000000000BB30000-0x000000000BB3A000-memory.dmpFilesize
40KB
-
memory/1984-144-0x0000000006170000-0x0000000006180000-memory.dmpFilesize
64KB
-
memory/4820-145-0x0000000000400000-0x0000000000724000-memory.dmpFilesize
3.1MB
-
memory/4820-147-0x0000000005630000-0x0000000005640000-memory.dmpFilesize
64KB
-
memory/4820-148-0x0000000006B80000-0x0000000007198000-memory.dmpFilesize
6.1MB
-
memory/4820-149-0x0000000006710000-0x0000000006760000-memory.dmpFilesize
320KB
-
memory/4820-150-0x0000000006970000-0x0000000006A22000-memory.dmpFilesize
712KB
-
memory/4820-151-0x0000000005630000-0x0000000005640000-memory.dmpFilesize
64KB