Resubmissions

14-11-2023 17:31

231114-v3qg7acf42 10

14-11-2023 17:21

231114-vxdw7sdg61 10

28-10-2023 19:29

231028-x7cs1age56 10

24-10-2023 13:29

231024-qrn3rsdb6z 10

18-10-2023 12:04

231018-n8ybnaeb31 10

07-09-2023 12:10

230907-pce1wahe2x 10

Analysis

  • max time kernel
    438s
  • max time network
    443s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2023 13:29

General

  • Target

    962bbb1929620dc69e35d52ce7e9684412e16e8ad2727222dbe3e47e9220f8e2.exe

  • Size

    756KB

  • MD5

    24badcb6d982b8851e6b6d8bbf07cd80

  • SHA1

    9532a957539e1f6a460028662bfbb1272c13c4c9

  • SHA256

    962bbb1929620dc69e35d52ce7e9684412e16e8ad2727222dbe3e47e9220f8e2

  • SHA512

    937de43c7c30b197e2b20cee535d5b326030f9f4ba9a69ff4e1ab59d47aa9eb9f0dcc56c06501f13cfc6d468759ddcd0e0c274885d855464946cee0e04a72a5d

  • SSDEEP

    12288:xpYbOsMEDla4b+o6rZa97avKECLgCZMaxq:/6MERa4ibZa9t8GMa

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

osu

C2

maniac.http80.info:4545

Mutex

zBta8WeDOfnNzuyXon

Attributes
  • encryption_key

    8Egbvbf22NkYGBnTSrbh

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\962bbb1929620dc69e35d52ce7e9684412e16e8ad2727222dbe3e47e9220f8e2.exe
    "C:\Users\Admin\AppData\Local\Temp\962bbb1929620dc69e35d52ce7e9684412e16e8ad2727222dbe3e47e9220f8e2.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.vbs"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5108
      • C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.exe
        "C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.exe
          "C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.exe

    Filesize

    756KB

    MD5

    299d1c44c38873d5cda63e7dc80166f9

    SHA1

    e4574294f0c6732127ee1eb190912d44974ebc15

    SHA256

    dc62195472a52f6a6ea66872b3020bdd2fb3cbf9b17c5c8e530522c8851a7f75

    SHA512

    c1a9cf8c14821c692d767f76474de40c93bff59efd7419171bf9f0d387b7ed62ac1a8db83c12a1217cad9b116b0fb3be6b66a9e971caa8d468299a3d50e7ea3b

  • C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.exe

    Filesize

    756KB

    MD5

    299d1c44c38873d5cda63e7dc80166f9

    SHA1

    e4574294f0c6732127ee1eb190912d44974ebc15

    SHA256

    dc62195472a52f6a6ea66872b3020bdd2fb3cbf9b17c5c8e530522c8851a7f75

    SHA512

    c1a9cf8c14821c692d767f76474de40c93bff59efd7419171bf9f0d387b7ed62ac1a8db83c12a1217cad9b116b0fb3be6b66a9e971caa8d468299a3d50e7ea3b

  • C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.exe

    Filesize

    756KB

    MD5

    299d1c44c38873d5cda63e7dc80166f9

    SHA1

    e4574294f0c6732127ee1eb190912d44974ebc15

    SHA256

    dc62195472a52f6a6ea66872b3020bdd2fb3cbf9b17c5c8e530522c8851a7f75

    SHA512

    c1a9cf8c14821c692d767f76474de40c93bff59efd7419171bf9f0d387b7ed62ac1a8db83c12a1217cad9b116b0fb3be6b66a9e971caa8d468299a3d50e7ea3b

  • C:\Users\Admin\AppData\Local\Temp\subfolder\chrome.vbs

    Filesize

    1024B

    MD5

    95fd611c303dfd75b4a3694194f9c1b4

    SHA1

    22d2fb834cc4822253900e836e979c3cfb44c7cc

    SHA256

    53f2d73a047e09e977f49391db8992785e72a81573f6ea868fec4f2d48974370

    SHA512

    2036efe6a0165864ff0d719da548f64fe604957cd2eee397f904f92fc8d384b5cb50b3b48c274094671877e15aeb438ac74a2ff49bc9d4eb8d0e5d09eb736d96

  • memory/1796-13-0x00000000006D0000-0x00000000006D6000-memory.dmp

    Filesize

    24KB

  • memory/2840-17-0x0000000000600000-0x000000000064E000-memory.dmp

    Filesize

    312KB

  • memory/2840-26-0x0000000005BF0000-0x0000000005C2C000-memory.dmp

    Filesize

    240KB

  • memory/2840-15-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2840-16-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2840-18-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/2840-32-0x0000000074530000-0x0000000074CE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2840-19-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/2840-20-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/2840-21-0x0000000004970000-0x0000000004F14000-memory.dmp

    Filesize

    5.6MB

  • memory/2840-22-0x00000000048B0000-0x0000000004942000-memory.dmp

    Filesize

    584KB

  • memory/2840-23-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/2840-24-0x0000000005220000-0x0000000005286000-memory.dmp

    Filesize

    408KB

  • memory/2840-25-0x0000000005690000-0x00000000056A2000-memory.dmp

    Filesize

    72KB

  • memory/2840-14-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2840-28-0x0000000005F80000-0x0000000005F8A000-memory.dmp

    Filesize

    40KB

  • memory/2840-30-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/5032-2-0x0000000002290000-0x0000000002296000-memory.dmp

    Filesize

    24KB