Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 15:56
Static task
static1
Behavioral task
behavioral1
Sample
AOU2.exe
Resource
win7-20230712-en
General
-
Target
AOU2.exe
-
Size
1.3MB
-
MD5
6ef27bb17948bf2cd5f17d32506ab25f
-
SHA1
1cace02f54cb1696be68e2ee291e26c051293a51
-
SHA256
4a412162a0b00623211b7303bc18b00b76d196ea8343a2c35abc262e9e97c9b2
-
SHA512
38d33e4f1d445ddbb5a45be34f369e60b22f5c29733e3acec9b156851e8494cd5845d22b2c71794b51c2ae73a890685f35dc1738c0e706f8b93c2272545885de
-
SSDEEP
24576:0KWHORcD/gtB49yDx553XTWcdjrFY5des+Lpq1qe9UdaRkss0:MHMRBO4TxXTLtLpqjOd+kss
Malware Config
Extracted
quasar
1.4.0
Office04
173.225.115.99:7702
ecce8627-6b34-425d-8f0e-3a8923c66220
-
encryption_key
F04A75E6507173FAEEC2BB82C564030A5E8413FF
-
install_name
ser.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
quar
Signatures
-
Quasar payload 6 IoCs
resource yara_rule behavioral2/files/0x00080000000231f6-50.dat family_quasar behavioral2/files/0x00080000000231f6-49.dat family_quasar behavioral2/files/0x00080000000231f6-39.dat family_quasar behavioral2/memory/1840-52-0x0000000000690000-0x0000000000714000-memory.dmp family_quasar behavioral2/files/0x0006000000023220-62.dat family_quasar behavioral2/files/0x0006000000023220-61.dat family_quasar -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\856S4e89hA9ANBPMkRMWYwByaI1dh.exe b52gate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\856S4e89hA9ANBPMkRMWYwByaI1dh.exe b52gate.exe -
Executes dropped EXE 6 IoCs
pid Process 2212 fend.exe 2440 gate.exe 2060 VB64.exe 1840 qua.exe 3896 ser.exe 1832 b52gate.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b52gate = "C:\\Users\\Admin\\AppData\\Roaming\\b52gate\\b52gate.exe" b52gate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1840 qua.exe Token: SeDebugPrivilege 3896 ser.exe Token: SeDebugPrivilege 2440 gate.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2440 gate.exe 1832 b52gate.exe 3896 ser.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3896 ser.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4828 wrote to memory of 2212 4828 AOU2.exe 82 PID 4828 wrote to memory of 2212 4828 AOU2.exe 82 PID 4828 wrote to memory of 2440 4828 AOU2.exe 83 PID 4828 wrote to memory of 2440 4828 AOU2.exe 83 PID 4828 wrote to memory of 2440 4828 AOU2.exe 83 PID 4828 wrote to memory of 2060 4828 AOU2.exe 84 PID 4828 wrote to memory of 2060 4828 AOU2.exe 84 PID 4828 wrote to memory of 1840 4828 AOU2.exe 85 PID 4828 wrote to memory of 1840 4828 AOU2.exe 85 PID 1840 wrote to memory of 3896 1840 qua.exe 86 PID 1840 wrote to memory of 3896 1840 qua.exe 86 PID 2440 wrote to memory of 1832 2440 gate.exe 87 PID 2440 wrote to memory of 1832 2440 gate.exe 87 PID 2440 wrote to memory of 1832 2440 gate.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\AOU2.exe"C:\Users\Admin\AppData\Local\Temp\AOU2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\fend.exe"C:\Users\Admin\AppData\Local\Temp\fend.exe"2⤵
- Executes dropped EXE
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\gate.exe"C:\Users\Admin\AppData\Local\Temp\gate.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe"C:\Users\Admin\AppData\Roaming\b52gate\b52gate.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\VB64.exe"C:\Users\Admin\AppData\Local\Temp\VB64.exe"2⤵
- Executes dropped EXE
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\qua.exe"C:\Users\Admin\AppData\Local\Temp\qua.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\quar\ser.exe"C:\Users\Admin\AppData\Roaming\quar\ser.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD50dbad8bd336bf6e2bec7a323a1162c7b
SHA1adb907702c963f8aa7e2580a93a89f62139cc013
SHA25609faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047
SHA512b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b
-
Filesize
55KB
MD50dbad8bd336bf6e2bec7a323a1162c7b
SHA1adb907702c963f8aa7e2580a93a89f62139cc013
SHA25609faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047
SHA512b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b
-
Filesize
55KB
MD50dbad8bd336bf6e2bec7a323a1162c7b
SHA1adb907702c963f8aa7e2580a93a89f62139cc013
SHA25609faa0f38dbbb5dfb4a821fb88589727f4410ede321a5e2858c1edaee538a047
SHA512b1524f3d41e4237bf454d0da437fef4945e1484d884f06dd251c9725fc48469c96e1f620889b6e3b38b361b6c25d84a05ad5e362a86274acd39d044f9183c91b
-
Filesize
14KB
MD5db7180315606402c98b528205c4f5168
SHA17b7c070eb123622d56d43b0ffff6547bc0d5d09a
SHA256824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78
SHA512e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab
-
Filesize
14KB
MD5db7180315606402c98b528205c4f5168
SHA17b7c070eb123622d56d43b0ffff6547bc0d5d09a
SHA256824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78
SHA512e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab
-
Filesize
14KB
MD5db7180315606402c98b528205c4f5168
SHA17b7c070eb123622d56d43b0ffff6547bc0d5d09a
SHA256824d880eb5ecfe7e0d74b59957748af9603e293f32f2b2466d1c76347dfcaa78
SHA512e4edae6b0d5dfedf9ac0c8cb65155267a6bfaa108a23be61d372cc968f50f595f577ef6fd862165989939215001bb73e5057bfd39f72a328ff8d34b98bbf76ab
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
95KB
MD5f2c20580687d5e95b9c7226390115e76
SHA17e61b259c635fdc4b4c3fb42a72b9182f556743b
SHA2565d91b008b2dbb987d22919f46a42811fd0a0d9c44e3e89f2cd771937daf147dd
SHA512a7bb282d5b8036ffa34aae9cd6f9d50e04879307966e5fde3831b334f436423777bf7ab9cd7c25dd88ede8be36cce10f3dd128e107ed3217ccd954ea1b3f7129
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a
-
Filesize
502KB
MD594735a9ba9ccfd4df241558b39a1c897
SHA1e35aee5b3bf2762fb28f30867dc7ef6c0c7abcc6
SHA256f55f318a58f3229681697e3405142697fa925455222a5a1f272fd34e9c84e314
SHA5120cb13d79a6946e3224d98157e3d4cd1f6eacd6a55e2b47e7a9db88ff11a54559ddf1f0ffefd78ab497bc08038a96afed47da418563c3de77921e49207a88d16a