Analysis

  • max time kernel
    170s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 03:02

General

  • Target

    aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe

  • Size

    1.0MB

  • MD5

    e51e1e4a21fef3fd98784683d80b5a02

  • SHA1

    309790387ec94c189ef94803a87fab335159657a

  • SHA256

    aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7

  • SHA512

    329922a8229f6e07f549e8919b4f6e1d60bf7d153b30487c8dde0116d8b31745f88d3f7bf20616d2a88276e8d2c24859e73440a03d4d2ecc08cd207678d84265

  • SSDEEP

    24576:A1QNv9uN9fFNd6AtvbGN/BCfKEPmxKVnRNWg:A1WluN9fZvbGyKFxg

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

PVP2

C2

clausetestbits.chickenkiller.com:64598

snoetestbits.ignorelist.com:64598

Mutex

QSR_MUTEX_ttz0i8tcYpqYyKkP3l

Attributes
  • encryption_key

    kxBjTYBAXsyGYsjsYZcL

  • install_name

    mcr.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    mcs

  • subdirectory

    mcr

Signatures

  • Quasar RAT 3 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 3 IoCs
  • Detects executables containing common artifacts observed in infostealers 3 IoCs
  • Detects executables packed with ConfuserEx Mod 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe
    "C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe
      C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "mcs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe" /rl HIGHEST /f
        3⤵
        • Quasar RAT
        • Creates scheduled task(s)
        PID:936
      • C:\Users\Admin\AppData\Roaming\mcr\mcr.exe
        "C:\Users\Admin\AppData\Roaming\mcr\mcr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1884
        • C:\Users\Admin\AppData\Roaming\mcr\mcr.exe
          C:\Users\Admin\AppData\Roaming\mcr\mcr.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:876
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "mcs" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\mcr\mcr.exe" /rl HIGHEST /f
            5⤵
            • Creates scheduled task(s)
            PID:1672
        • C:\Users\Admin\AppData\Roaming\mcr\mcr.exe
          C:\Users\Admin\AppData\Roaming\mcr\mcr.exe
          4⤵
          • Executes dropped EXE
          PID:588
    • C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe
      C:\Users\Admin\AppData\Local\Temp\aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7.exe
      2⤵
        PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\mcr\mcr.exe

      Filesize

      1.0MB

      MD5

      e51e1e4a21fef3fd98784683d80b5a02

      SHA1

      309790387ec94c189ef94803a87fab335159657a

      SHA256

      aad9903b9803b9a3e2d6c7677d8eb80f537a3543e26725c48dde5e4c53d518b7

      SHA512

      329922a8229f6e07f549e8919b4f6e1d60bf7d153b30487c8dde0116d8b31745f88d3f7bf20616d2a88276e8d2c24859e73440a03d4d2ecc08cd207678d84265

    • memory/876-43-0x0000000004A30000-0x0000000004A70000-memory.dmp

      Filesize

      256KB

    • memory/876-42-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/876-46-0x0000000004A30000-0x0000000004A70000-memory.dmp

      Filesize

      256KB

    • memory/876-45-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1884-44-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1884-31-0x0000000000D00000-0x0000000000E0A000-memory.dmp

      Filesize

      1.0MB

    • memory/1884-32-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2520-4-0x0000000009E70000-0x0000000009F88000-memory.dmp

      Filesize

      1.1MB

    • memory/2520-5-0x0000000000570000-0x0000000000576000-memory.dmp

      Filesize

      24KB

    • memory/2520-18-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2520-0-0x0000000000EC0000-0x0000000000FCA000-memory.dmp

      Filesize

      1.0MB

    • memory/2520-3-0x0000000004940000-0x0000000004980000-memory.dmp

      Filesize

      256KB

    • memory/2520-2-0x0000000000540000-0x0000000000546000-memory.dmp

      Filesize

      24KB

    • memory/2520-1-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2692-17-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2692-19-0x00000000003A0000-0x00000000003E0000-memory.dmp

      Filesize

      256KB

    • memory/2692-21-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2720-20-0x0000000004970000-0x00000000049B0000-memory.dmp

      Filesize

      256KB

    • memory/2720-33-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2720-30-0x0000000004970000-0x00000000049B0000-memory.dmp

      Filesize

      256KB

    • memory/2720-22-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2720-16-0x0000000073FE0000-0x00000000746CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2720-13-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2720-9-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2720-6-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB