Analysis
-
max time kernel
127s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2023 06:01
Behavioral task
behavioral1
Sample
AstralAimbot_4.2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
AstralAimbot_4.2.exe
Resource
win10-20230703-en
General
-
Target
AstralAimbot_4.2.exe
-
Size
3.1MB
-
MD5
d3b8122fe1ab8628492ba209d6da8c9d
-
SHA1
f19ba62ca57f4325e15a235dc0b74fa14b5624b2
-
SHA256
657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
-
SHA512
ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a
-
SSDEEP
49152:Cvht62XlaSFNWPjljiFa2RoUYIQi/bdpqUoGdZizoTHHB72eh2NT:CvL62XlaSFNWPjljiFXRoUYIF/b8
Malware Config
Extracted
quasar
1.4.1
asdasd
6.tcp.ngrok.io:18160
a05bb804-7a29-47fc-917b-02ee2cb4b1a2
-
encryption_key
02C7E31FB83C81538B3B7AEA158F1FCCDC2B0FEA
-
install_name
asdsdasd.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SystEm32
-
subdirectory
dasdasd
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral3/memory/572-0-0x00000000002F0000-0x0000000000614000-memory.dmp family_quasar behavioral3/files/0x000600000002323f-6.dat family_quasar behavioral3/files/0x000600000002323f-8.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 216 asdsdasd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3384 schtasks.exe 3972 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 572 AstralAimbot_4.2.exe Token: SeDebugPrivilege 216 asdsdasd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 216 asdsdasd.exe 216 asdsdasd.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 216 asdsdasd.exe 216 asdsdasd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 216 asdsdasd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 572 wrote to memory of 3972 572 AstralAimbot_4.2.exe 82 PID 572 wrote to memory of 3972 572 AstralAimbot_4.2.exe 82 PID 572 wrote to memory of 216 572 AstralAimbot_4.2.exe 83 PID 572 wrote to memory of 216 572 AstralAimbot_4.2.exe 83 PID 216 wrote to memory of 3384 216 asdsdasd.exe 86 PID 216 wrote to memory of 3384 216 asdsdasd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\AstralAimbot_4.2.exe"C:\Users\Admin\AppData\Local\Temp\AstralAimbot_4.2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3972
-
-
C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d3b8122fe1ab8628492ba209d6da8c9d
SHA1f19ba62ca57f4325e15a235dc0b74fa14b5624b2
SHA256657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
SHA512ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a
-
Filesize
3.1MB
MD5d3b8122fe1ab8628492ba209d6da8c9d
SHA1f19ba62ca57f4325e15a235dc0b74fa14b5624b2
SHA256657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
SHA512ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a