Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 22:59

General

  • Target

    bb004c673ce411201dd96cf3ca45337b2f423195bc464b923d92fa3694e0bc64.exe

  • Size

    3.5MB

  • MD5

    577c088800f5e59079cc84751facf5ce

  • SHA1

    796ca31670f9b70aa971c810fce8b98f078d3a73

  • SHA256

    bb004c673ce411201dd96cf3ca45337b2f423195bc464b923d92fa3694e0bc64

  • SHA512

    51142ae105e85c7dcde4d9536593eae6380dbf880838a41efeacbef8b27487b515850c35ed6f1e3d7b2eee6505c9d0cf97ca0bb627e89eed5c595790e6d03454

  • SSDEEP

    49152:cn1A79ccGPLR6+wlczUZpZ1+TzEsT1PW+/mcP4/x:cn279ccGPLR6+wlcoZpZ0p

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Detects executables containing base64 encoded User Agent 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb004c673ce411201dd96cf3ca45337b2f423195bc464b923d92fa3694e0bc64.exe
    "C:\Users\Admin\AppData\Local\Temp\bb004c673ce411201dd96cf3ca45337b2f423195bc464b923d92fa3694e0bc64.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4832

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4832-0-0x0000000000470000-0x00000000007F0000-memory.dmp

          Filesize

          3.5MB

        • memory/4832-1-0x00007FFABF1B0000-0x00007FFABFC71000-memory.dmp

          Filesize

          10.8MB

        • memory/4832-2-0x000000001B5D0000-0x000000001B5E0000-memory.dmp

          Filesize

          64KB

        • memory/4832-3-0x000000001B7E0000-0x000000001B830000-memory.dmp

          Filesize

          320KB

        • memory/4832-4-0x000000001B8F0000-0x000000001B9A2000-memory.dmp

          Filesize

          712KB

        • memory/4832-5-0x00007FFABF1B0000-0x00007FFABFC71000-memory.dmp

          Filesize

          10.8MB