Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2024 07:41
Behavioral task
behavioral1
Sample
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1.exe
Resource
win10v2004-20240226-en
General
-
Target
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1.exe
-
Size
3.1MB
-
MD5
22afa096fc6c8ce6b3c60566e7b41c37
-
SHA1
33d0f33ea8bf5bfa2c6e02aeb662593d9a4085a7
-
SHA256
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1
-
SHA512
59eb53c41b5c3884cae8a597554c380e3a38092816cbbbe58b384d4e47d90c845be5d5cf78b3c46eceed9eba279b77cec0fdcdd6b8c92d19c850d60d9ea9c875
-
SSDEEP
49152:qvKI22SsaNYfdPBldt698dBcjH/WRJ6kbR3LoGdZTHHB72eh2NT:qvn22SsaNYfdPBldt6+dBcjH/WRJ6u
Malware Config
Extracted
quasar
1.4.1
System
applereports.ddns.net:4782
3d9fa69f-5f42-4669-9ddb-045d48b0bd41
-
encryption_key
B6CDE8700F6B9BF3EDD9D9B86838C8E30C43F685
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2724-0-0x0000000000820000-0x0000000000B44000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2724 6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2724 6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1.exe"C:\Users\Admin\AppData\Local\Temp\6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2724