Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 23:05
Behavioral task
behavioral1
Sample
26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32.exe
Resource
win7-20231215-en
General
-
Target
26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32.exe
-
Size
3.1MB
-
MD5
fb65297d2d0858bcd12b65e845fdafb8
-
SHA1
220369e32a3fdbc4610e2020b4e851c1a8278f42
-
SHA256
26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32
-
SHA512
950eb9c2f224b81e788f7d9536a1bb0ce3b6fa2595051977d1991b6324c575f578a9b96b07983fe741000090f12ead63e110745a41f206dc2b09270682d2aa56
-
SSDEEP
49152:zvTlL26AaNeWgPhlmVqvMQ7XSKhxRJ61bR3LoGd5wTHHB72eh2NT:zvJL26AaNeWgPhlmVqkQ7XSKhxRJ6H
Malware Config
Extracted
quasar
1.4.1
Office04
third-ride.gl.at.ply.gg:60702
127.0.0.1:60702
36963e0b-20db-4ea8-93a8-96f126a8ad7c
-
encryption_key
4F9C7D70F127739A4DD76AEAE39E9301ACC438F0
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/756-0-0x00000000005C0000-0x00000000008E4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 756 26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 756 26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32.exe"C:\Users\Admin\AppData\Local\Temp\26a281534bcbf467b36882cb224d95e6f93e6307bd4b6c82cfe16f1c4b30bc32.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:756