Analysis

  • max time kernel
    1798s
  • max time network
    1591s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2023 09:45

General

  • Target

    3.exe

  • Size

    3.1MB

  • MD5

    fc4aeba6edc65fcf2bd47bf61c66ca4c

  • SHA1

    532f44164ccec22376d6e29f58f44934dfeadb5c

  • SHA256

    0a6e5f7ca85a281115b343cb8be21e969ab42efb02ff8cc138c7800291839c8d

  • SHA512

    3c72078fdacbe38418b4a8ffc34e895a69e8c7df5175f0207b56c5ae4f043b3571e05e6e38e5100b21af52e05e80dfee27ff1a44a687d8ae380efda7b11f43d1

  • SSDEEP

    49152:ev1t62XlaSFNWPjljiFa2RoUYIjjjYmzYaoGd4THHB72eh2NT:evH62XlaSFNWPjljiFXRoUYIjjj3

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

127.0.0.7:5555

Mutex

6f01cc79-8527-4436-a34a-473fcf92b46f

Attributes
  • encryption_key

    D52EA8296126E8DD7D221BC02E2826F1CAA96C78

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3.exe
    "C:\Users\Admin\AppData\Local\Temp\3.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:656
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2168
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:924
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4196

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      b872b8d2943938922c555034663a5fc4

      SHA1

      f654a891d50f5bf33ee6f7559e4ed2d2a7b5793c

      SHA256

      0ae2995984ea2d72702a43e7abb089a44348fbbb1ad6a116c76ea6c9e1dc57f1

      SHA512

      d6c3ce58e8aee10eac2005ed558d8209ca64e623805eb5ab7d6cfb7ec4b9191094c3c95a31bbe90d41ce3ee06fc06faa209dc5e6c9507ee44d448c56171aa749

    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

      Filesize

      3.1MB

      MD5

      fc4aeba6edc65fcf2bd47bf61c66ca4c

      SHA1

      532f44164ccec22376d6e29f58f44934dfeadb5c

      SHA256

      0a6e5f7ca85a281115b343cb8be21e969ab42efb02ff8cc138c7800291839c8d

      SHA512

      3c72078fdacbe38418b4a8ffc34e895a69e8c7df5175f0207b56c5ae4f043b3571e05e6e38e5100b21af52e05e80dfee27ff1a44a687d8ae380efda7b11f43d1

    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

      Filesize

      3.1MB

      MD5

      fc4aeba6edc65fcf2bd47bf61c66ca4c

      SHA1

      532f44164ccec22376d6e29f58f44934dfeadb5c

      SHA256

      0a6e5f7ca85a281115b343cb8be21e969ab42efb02ff8cc138c7800291839c8d

      SHA512

      3c72078fdacbe38418b4a8ffc34e895a69e8c7df5175f0207b56c5ae4f043b3571e05e6e38e5100b21af52e05e80dfee27ff1a44a687d8ae380efda7b11f43d1

    • memory/2004-13-0x000000001C7B0000-0x000000001C862000-memory.dmp

      Filesize

      712KB

    • memory/2004-15-0x000000001BB90000-0x000000001BBA0000-memory.dmp

      Filesize

      64KB

    • memory/2004-14-0x00007FFD4FC40000-0x00007FFD50701000-memory.dmp

      Filesize

      10.8MB

    • memory/2004-10-0x00007FFD4FC40000-0x00007FFD50701000-memory.dmp

      Filesize

      10.8MB

    • memory/2004-11-0x000000001BB90000-0x000000001BBA0000-memory.dmp

      Filesize

      64KB

    • memory/2004-12-0x000000001C6A0000-0x000000001C6F0000-memory.dmp

      Filesize

      320KB

    • memory/4196-50-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-65-0x000001D429A00000-0x000001D429A01000-memory.dmp

      Filesize

      4KB

    • memory/4196-84-0x000001D429C60000-0x000001D429C61000-memory.dmp

      Filesize

      4KB

    • memory/4196-16-0x000001D421740000-0x000001D421750000-memory.dmp

      Filesize

      64KB

    • memory/4196-32-0x000001D421840000-0x000001D421850000-memory.dmp

      Filesize

      64KB

    • memory/4196-48-0x000001D429DC0000-0x000001D429DC1000-memory.dmp

      Filesize

      4KB

    • memory/4196-49-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-83-0x000001D429B50000-0x000001D429B51000-memory.dmp

      Filesize

      4KB

    • memory/4196-51-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-52-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-53-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-54-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-55-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-56-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-57-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-58-0x000001D429DE0000-0x000001D429DE1000-memory.dmp

      Filesize

      4KB

    • memory/4196-59-0x000001D429A10000-0x000001D429A11000-memory.dmp

      Filesize

      4KB

    • memory/4196-60-0x000001D429A00000-0x000001D429A01000-memory.dmp

      Filesize

      4KB

    • memory/4196-62-0x000001D429A10000-0x000001D429A11000-memory.dmp

      Filesize

      4KB

    • memory/4196-82-0x000001D429B50000-0x000001D429B51000-memory.dmp

      Filesize

      4KB

    • memory/4196-68-0x000001D429940000-0x000001D429941000-memory.dmp

      Filesize

      4KB

    • memory/4196-80-0x000001D429B40000-0x000001D429B41000-memory.dmp

      Filesize

      4KB

    • memory/4904-1-0x00007FFD4FC40000-0x00007FFD50701000-memory.dmp

      Filesize

      10.8MB

    • memory/4904-9-0x00007FFD4FC40000-0x00007FFD50701000-memory.dmp

      Filesize

      10.8MB

    • memory/4904-0-0x0000000000260000-0x0000000000584000-memory.dmp

      Filesize

      3.1MB

    • memory/4904-2-0x000000001B150000-0x000000001B160000-memory.dmp

      Filesize

      64KB