Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2023 01:01
Behavioral task
behavioral1
Sample
asdasdsada.exe
Resource
win7-20230712-en
General
-
Target
asdasdsada.exe
-
Size
3.1MB
-
MD5
05a5ad59a263d577fbf7824da19f52c0
-
SHA1
f1e59d269eba32b689b955666ac2b7cb7f28eb71
-
SHA256
dc2e73a62f8b7544a3c9597784c56e59f9e6f3ec15842b2be8b45ede3634cf94
-
SHA512
28f630d95b47940f1a9259191931ee6c2548fdbe34af5064626f55f1c798b5c0cd91a5d46440298b95e57b7b532696b48b8bb5605fd3e80db6073a217424be49
-
SSDEEP
49152:fvWlL26AaNeWgPhlmVqvMQ7XSKzvRJ6wbR3LoGd0THHB72eh2NT:fvWL26AaNeWgPhlmVqkQ7XSKzvRJ6K
Malware Config
Extracted
quasar
1.4.1
Infected
192.168.1.1:4782
192.168.1.66:4782
ff410ede-beff-4970-8e12-7d251057f1fd
-
encryption_key
1B172706DED462B59F2A5056AB06A8DD1EE8491B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4440-133-0x0000000000700000-0x0000000000A24000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Client.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
Client.exepid process 4568 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
asdasdsada.exeClient.exedescription pid process Token: SeDebugPrivilege 4440 asdasdsada.exe Token: SeDebugPrivilege 4568 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid process 4568 Client.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
asdasdsada.exedescription pid process target process PID 4440 wrote to memory of 4568 4440 asdasdsada.exe Client.exe PID 4440 wrote to memory of 4568 4440 asdasdsada.exe Client.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\asdasdsada.exe"C:\Users\Admin\AppData\Local\Temp\asdasdsada.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
3.1MB
MD505a5ad59a263d577fbf7824da19f52c0
SHA1f1e59d269eba32b689b955666ac2b7cb7f28eb71
SHA256dc2e73a62f8b7544a3c9597784c56e59f9e6f3ec15842b2be8b45ede3634cf94
SHA51228f630d95b47940f1a9259191931ee6c2548fdbe34af5064626f55f1c798b5c0cd91a5d46440298b95e57b7b532696b48b8bb5605fd3e80db6073a217424be49
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exeFilesize
3.1MB
MD505a5ad59a263d577fbf7824da19f52c0
SHA1f1e59d269eba32b689b955666ac2b7cb7f28eb71
SHA256dc2e73a62f8b7544a3c9597784c56e59f9e6f3ec15842b2be8b45ede3634cf94
SHA51228f630d95b47940f1a9259191931ee6c2548fdbe34af5064626f55f1c798b5c0cd91a5d46440298b95e57b7b532696b48b8bb5605fd3e80db6073a217424be49
-
memory/4440-133-0x0000000000700000-0x0000000000A24000-memory.dmpFilesize
3.1MB
-
memory/4440-134-0x00007FF940A10000-0x00007FF9414D1000-memory.dmpFilesize
10.8MB
-
memory/4440-135-0x000000001B820000-0x000000001B830000-memory.dmpFilesize
64KB
-
memory/4440-142-0x00007FF940A10000-0x00007FF9414D1000-memory.dmpFilesize
10.8MB
-
memory/4568-141-0x00007FF940A10000-0x00007FF9414D1000-memory.dmpFilesize
10.8MB
-
memory/4568-143-0x000000001BD60000-0x000000001BD70000-memory.dmpFilesize
64KB
-
memory/4568-144-0x000000001BCE0000-0x000000001BD30000-memory.dmpFilesize
320KB
-
memory/4568-145-0x000000001C3A0000-0x000000001C452000-memory.dmpFilesize
712KB
-
memory/4568-146-0x00007FF940A10000-0x00007FF9414D1000-memory.dmpFilesize
10.8MB
-
memory/4568-147-0x000000001BD60000-0x000000001BD70000-memory.dmpFilesize
64KB