Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
21/09/2023, 15:05
Behavioral task
behavioral1
Sample
xwmy1oaJ1ZKs.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
xwmy1oaJ1ZKs.exe
-
Size
288KB
-
MD5
d292defb89bac7be1d7f41a292887eeb
-
SHA1
56e094ea22fdde282949a4d987178a6f59b3b27b
-
SHA256
eb4f98a7aadc4eb5feceab64bd93b1d9c077510dd3cdb0efb6c733acd45b6e41
-
SHA512
f35d95111ad870bf0f675863ea609001d0a994b9388fc918a84952ecaf983d8d28a5073dd3e04a2595e8d8cb2379c652f6fbb0039f41cf4a76d764a7469fbc23
-
SSDEEP
6144:jRSjIXAnZQel5w7T4P5Kq+SMv0VGb7bDcllbkAq:o4AZrg7g9zVGkllbkV
Malware Config
Extracted
Family
quasar
Version
1.4.0.0
Botnet
Office04
C2
microsoft-virtualpc.duckdns.org:4782
Mutex
E2YATkLA294znzRxeX
Attributes
-
encryption_key
gTJCDtT0AcfvyNJB5Vqb
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
Family
quasar
Attributes
-
reconnect_delay
3000
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/2444-0-0x00000000000C0000-0x000000000010E000-memory.dmp family_quasar behavioral1/memory/2444-2-0x00000000049E0000-0x0000000004A20000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2444 xwmy1oaJ1ZKs.exe