Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2023, 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f96ebec7e775e74f8ca42dfd15d576c61be51f9446f61ec1ea4d728c2a157af1.exe
Resource
win7-20231023-en
12 signatures
150 seconds
General
-
Target
f96ebec7e775e74f8ca42dfd15d576c61be51f9446f61ec1ea4d728c2a157af1.exe
-
Size
9.6MB
-
MD5
0745bb5bb478d211262acd879036a7b3
-
SHA1
f1b69aa0ae169e87a844d2c28638dc8758505b26
-
SHA256
f96ebec7e775e74f8ca42dfd15d576c61be51f9446f61ec1ea4d728c2a157af1
-
SHA512
9ae0599136fb8990fa26d156496c55d318aa035fd7b174dd6d1de7f95eb9afec81a16b91a8c3b32ae40f913ca1b7edafdc17eeabb901ea207fb88b47d8686030
-
SSDEEP
196608:PJQaPHrQqXs140qMhu8369sV+HLz9SKUeNdDhHidV+hzGWV2RfRof5wQlavxQoFr:PJQaPHrQqXs140qMhu8369sV+HLz9SK6
Malware Config
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral2/memory/1924-45-0x000000001D0D0000-0x000000001D34C000-memory.dmp family_quasar behavioral2/memory/1924-57-0x000000001D0D0000-0x000000001D34C000-memory.dmp family_quasar behavioral2/memory/1924-66-0x000000001D6F0000-0x000000001D96C000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1924 f96ebec7e775e74f8ca42dfd15d576c61be51f9446f61ec1ea4d728c2a157af1.exe