Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2023 02:46
Static task
static1
Behavioral task
behavioral1
Sample
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe
Resource
win7-20231020-en
General
-
Target
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe
-
Size
502KB
-
MD5
f4a3d9404ad522ec1b9bd8feb8dca3b5
-
SHA1
33201170d62419689b5685b22325512c27ca16ab
-
SHA256
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88
-
SHA512
c593bab9c02e4a5a78d420710e422e8b562e2d2e040c745a75aac4a44695ec8d8e83ef999abd17fdd0db0e668a390d93f9d121446fb2f702d982e0bc8e04beea
-
SSDEEP
6144:8zAOLe5C9/l3Iv3hlwJYrCp5+kP/af/9jwlYj4ixSP7PtcaZuSrg6n2i3UMyoQTk:8zxICbojRxEceusRn1EvQY
Malware Config
Extracted
quasar
1.4.0.0
Office
37.1.207.27:222
7xg1muSKali1I2y5IZ
-
encryption_key
KWyZntdiPrrGnzylskuR
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3576-10-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exedescription pid process target process PID 3128 set thread context of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exepid process 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exedescription pid process Token: SeDebugPrivilege 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe Token: SeDebugPrivilege 3576 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exepid process 3576 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exedescription pid process target process PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe PID 3128 wrote to memory of 3576 3128 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe 9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe"C:\Users\Admin\AppData\Local\Temp\9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exeC:\Users\Admin\AppData\Local\Temp\9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9d737c768d419aed55de299a114fb8b4928d263320caa4b35c08f4c0bb3fcb88.exe.logFilesize
418B
MD550045c5c59ae3eb2db5452fb39e13335
SHA156226b40d4458df7e92f802381401e4183c97cb2
SHA256b90b2a4ba2c69f094edce48807ad1873b1265c83795139fbf4576697fe65cae9
SHA512bb20f9389e69e4a17fa254bd3b77212797f3be159ec6129b3a1501db3e24fb7b12096fbdbfcc93c24ecdb3cea88eae8a58e279b39c0777b6a4e9d4c15057faa4
-
memory/3128-14-0x0000000074E10000-0x00000000755C0000-memory.dmpFilesize
7.7MB
-
memory/3128-1-0x0000000074E10000-0x00000000755C0000-memory.dmpFilesize
7.7MB
-
memory/3128-2-0x00000000018C0000-0x00000000018D0000-memory.dmpFilesize
64KB
-
memory/3128-3-0x00000000056E0000-0x0000000005752000-memory.dmpFilesize
456KB
-
memory/3128-4-0x0000000005890000-0x0000000005900000-memory.dmpFilesize
448KB
-
memory/3128-5-0x00000000059A0000-0x0000000005A3C000-memory.dmpFilesize
624KB
-
memory/3128-6-0x0000000074E10000-0x00000000755C0000-memory.dmpFilesize
7.7MB
-
memory/3128-7-0x00000000018C0000-0x00000000018D0000-memory.dmpFilesize
64KB
-
memory/3128-8-0x00000000016E0000-0x0000000001748000-memory.dmpFilesize
416KB
-
memory/3128-9-0x00000000065F0000-0x0000000006B94000-memory.dmpFilesize
5.6MB
-
memory/3128-0-0x0000000000D40000-0x0000000000DC6000-memory.dmpFilesize
536KB
-
memory/3576-10-0x0000000000400000-0x000000000044E000-memory.dmpFilesize
312KB
-
memory/3576-13-0x0000000074E10000-0x00000000755C0000-memory.dmpFilesize
7.7MB
-
memory/3576-15-0x0000000004D50000-0x0000000004DE2000-memory.dmpFilesize
584KB
-
memory/3576-16-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB
-
memory/3576-17-0x0000000004EF0000-0x0000000004F56000-memory.dmpFilesize
408KB
-
memory/3576-18-0x0000000005B30000-0x0000000005B42000-memory.dmpFilesize
72KB
-
memory/3576-19-0x00000000060B0000-0x00000000060EC000-memory.dmpFilesize
240KB
-
memory/3576-21-0x0000000006420000-0x000000000642A000-memory.dmpFilesize
40KB
-
memory/3576-22-0x0000000074E10000-0x00000000755C0000-memory.dmpFilesize
7.7MB
-
memory/3576-23-0x0000000004CA0000-0x0000000004CB0000-memory.dmpFilesize
64KB