Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2023 15:56

General

  • Target

    AOU2.exe

  • Size

    1.3MB

  • MD5

    6ef27bb17948bf2cd5f17d32506ab25f

  • SHA1

    1cace02f54cb1696be68e2ee291e26c051293a51

  • SHA256

    4a412162a0b00623211b7303bc18b00b76d196ea8343a2c35abc262e9e97c9b2

  • SHA512

    38d33e4f1d445ddbb5a45be34f369e60b22f5c29733e3acec9b156851e8494cd5845d22b2c71794b51c2ae73a890685f35dc1738c0e706f8b93c2272545885de

  • SSDEEP

    24576:0KWHORcD/gtB49yDx553XTWcdjrFY5des+Lpq1qe9UdaRkss0:MHMRBO4TxXTLtLpqjOd+kss

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

173.225.115.99:7702

Mutex

ecce8627-6b34-425d-8f0e-3a8923c66220

Attributes
  • encryption_key

    F04A75E6507173FAEEC2BB82C564030A5E8413FF

  • install_name

    ser.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    quar

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 6 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AOU2.exe
    "C:\Users\Admin\AppData\Local\Temp\AOU2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Users\Admin\AppData\Local\Temp\fend.exe
      "C:\Users\Admin\AppData\Local\Temp\fend.exe"
      2⤵
      • Executes dropped EXE
      PID:2212
    • C:\Users\Admin\AppData\Local\Temp\gate.exe
      "C:\Users\Admin\AppData\Local\Temp\gate.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe
        "C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of FindShellTrayWindow
        PID:1832
    • C:\Users\Admin\AppData\Local\Temp\VB64.exe
      "C:\Users\Admin\AppData\Local\Temp\VB64.exe"
      2⤵
      • Executes dropped EXE
      PID:2060
    • C:\Users\Admin\AppData\Local\Temp\qua.exe
      "C:\Users\Admin\AppData\Local\Temp\qua.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Users\Admin\AppData\Roaming\quar\ser.exe
        "C:\Users\Admin\AppData\Roaming\quar\ser.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VB64.exe

    Filesize

    55KB

    MD5

    0dbad8bd336bf6e2bec7a323a1162c7b

    SHA1

    adb907702c963f8aa7e2580a93a89f62139cc013

    SHA256

    09faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047

    SHA512

    b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b

  • C:\Users\Admin\AppData\Local\Temp\VB64.exe

    Filesize

    55KB

    MD5

    0dbad8bd336bf6e2bec7a323a1162c7b

    SHA1

    adb907702c963f8aa7e2580a93a89f62139cc013

    SHA256

    09faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047

    SHA512

    b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b

  • C:\Users\Admin\AppData\Local\Temp\VB64.exe

    Filesize

    55KB

    MD5

    0dbad8bd336bf6e2bec7a323a1162c7b

    SHA1

    adb907702c963f8aa7e2580a93a89f62139cc013

    SHA256

    09faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047

    SHA512

    b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b

  • C:\Users\Admin\AppData\Local\Temp\fend.exe

    Filesize

    14KB

    MD5

    db7180315606402c98b528205c4f5168

    SHA1

    7b7c070eb123622d56d43b0ffff6547bc0d5d09a

    SHA256

    824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78

    SHA512

    e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab

  • C:\Users\Admin\AppData\Local\Temp\fend.exe

    Filesize

    14KB

    MD5

    db7180315606402c98b528205c4f5168

    SHA1

    7b7c070eb123622d56d43b0ffff6547bc0d5d09a

    SHA256

    824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78

    SHA512

    e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab

  • C:\Users\Admin\AppData\Local\Temp\fend.exe

    Filesize

    14KB

    MD5

    db7180315606402c98b528205c4f5168

    SHA1

    7b7c070eb123622d56d43b0ffff6547bc0d5d09a

    SHA256

    824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78

    SHA512

    e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab

  • C:\Users\Admin\AppData\Local\Temp\gate.exe

    Filesize

    95KB

    MD5

    f2c20580687d5e95b9c7226390115e76

    SHA1

    7e61b259c635fdc4b4c3fb42a72b9182f556743b

    SHA256

    5d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd

    SHA512

    a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129

  • C:\Users\Admin\AppData\Local\Temp\gate.exe

    Filesize

    95KB

    MD5

    f2c20580687d5e95b9c7226390115e76

    SHA1

    7e61b259c635fdc4b4c3fb42a72b9182f556743b

    SHA256

    5d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd

    SHA512

    a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129

  • C:\Users\Admin\AppData\Local\Temp\gate.exe

    Filesize

    95KB

    MD5

    f2c20580687d5e95b9c7226390115e76

    SHA1

    7e61b259c635fdc4b4c3fb42a72b9182f556743b

    SHA256

    5d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd

    SHA512

    a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129

  • C:\Users\Admin\AppData\Local\Temp\qua.exe

    Filesize

    502KB

    MD5

    94735a9ba9ccfd4df241558b39a1c897

    SHA1

    e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6

    SHA256

    f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314

    SHA512

    0cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a

  • C:\Users\Admin\AppData\Local\Temp\qua.exe

    Filesize

    502KB

    MD5

    94735a9ba9ccfd4df241558b39a1c897

    SHA1

    e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6

    SHA256

    f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314

    SHA512

    0cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a

  • C:\Users\Admin\AppData\Local\Temp\qua.exe

    Filesize

    502KB

    MD5

    94735a9ba9ccfd4df241558b39a1c897

    SHA1

    e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6

    SHA256

    f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314

    SHA512

    0cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a

  • C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe

    Filesize

    95KB

    MD5

    f2c20580687d5e95b9c7226390115e76

    SHA1

    7e61b259c635fdc4b4c3fb42a72b9182f556743b

    SHA256

    5d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd

    SHA512

    a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129

  • C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe

    Filesize

    95KB

    MD5

    f2c20580687d5e95b9c7226390115e76

    SHA1

    7e61b259c635fdc4b4c3fb42a72b9182f556743b

    SHA256

    5d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd

    SHA512

    a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129

  • C:\Users\Admin\AppData\Roaming\quar\ser.exe

    Filesize

    502KB

    MD5

    94735a9ba9ccfd4df241558b39a1c897

    SHA1

    e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6

    SHA256

    f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314

    SHA512

    0cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a

  • C:\Users\Admin\AppData\Roaming\quar\ser.exe

    Filesize

    502KB

    MD5

    94735a9ba9ccfd4df241558b39a1c897

    SHA1

    e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6

    SHA256

    f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314

    SHA512

    0cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a

  • memory/1832-91-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/1832-82-0x0000000001190000-0x00000000011A0000-memory.dmp

    Filesize

    64KB

  • memory/1832-81-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/1832-83-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/1840-66-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/1840-52-0x0000000000690000-0x0000000000714000-memory.dmp

    Filesize

    528KB

  • memory/1840-55-0x000000001B340000-0x000000001B350000-memory.dmp

    Filesize

    64KB

  • memory/1840-57-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/2060-87-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/2060-58-0x000001EBF3B40000-0x000001EBF3B50000-memory.dmp

    Filesize

    64KB

  • memory/2060-46-0x000001EBF3760000-0x000001EBF3772000-memory.dmp

    Filesize

    72KB

  • memory/2060-53-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/2060-89-0x000001EBF3B40000-0x000001EBF3B50000-memory.dmp

    Filesize

    64KB

  • memory/2212-84-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/2212-16-0x0000016D82340000-0x0000016D8234A000-memory.dmp

    Filesize

    40KB

  • memory/2212-44-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/2440-80-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/2440-56-0x0000000074D50000-0x0000000075301000-memory.dmp

    Filesize

    5.7MB

  • memory/3896-65-0x000000001B660000-0x000000001B670000-memory.dmp

    Filesize

    64KB

  • memory/3896-64-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/3896-85-0x000000001C140000-0x000000001C190000-memory.dmp

    Filesize

    320KB

  • memory/3896-86-0x000000001C250000-0x000000001C302000-memory.dmp

    Filesize

    712KB

  • memory/3896-90-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/4828-0-0x00000000001B0000-0x00000000002FA000-memory.dmp

    Filesize

    1.3MB

  • memory/4828-1-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB

  • memory/4828-54-0x00007FF92CBA0000-0x00007FF92D661000-memory.dmp

    Filesize

    10.8MB