Malware Analysis Report

2024-10-23 21:29

Sample ID 240412-xkwbtsda74
Target Client-built.exe
SHA256 04b8bb3fc2b3311f5027fa536ec480a3211cbc4673efde460f59daf44a7a1f55
Tags
office04 quasar spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

04b8bb3fc2b3311f5027fa536ec480a3211cbc4673efde460f59daf44a7a1f55

Threat Level: Known bad

The file Client-built.exe was found to be: Known bad.

Malicious Activity Summary

office04 quasar spyware trojan

Quasar family

Quasar payload

Quasar RAT

Executes dropped EXE

Looks up external IP address via web service

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-12 18:55

Signatures

Quasar family

quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-12 18:55

Reported

2024-04-12 18:55

Platform

win10-20240404-en

Max time kernel

23s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client-built.exe

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "SubClient.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Client-built.exe" /rl HIGHEST /f

C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe

"C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "SubClient.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe" /rl HIGHEST /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 Lunasplanet-29399.portmap.host udp
DE 193.161.193.99:29399 Lunasplanet-29399.portmap.host tcp
US 8.8.8.8:53 99.193.161.193.in-addr.arpa udp

Files

memory/1844-1-0x0000000073940000-0x000000007402E000-memory.dmp

memory/1844-0-0x0000000000A50000-0x0000000000AAE000-memory.dmp

memory/1844-2-0x0000000005850000-0x0000000005D4E000-memory.dmp

memory/1844-3-0x00000000053F0000-0x0000000005482000-memory.dmp

memory/1844-4-0x00000000052D0000-0x00000000052E0000-memory.dmp

memory/1844-5-0x0000000005490000-0x00000000054F6000-memory.dmp

memory/1844-6-0x0000000005F90000-0x0000000005FA2000-memory.dmp

memory/1844-7-0x0000000006380000-0x00000000063BE000-memory.dmp

C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe

MD5 46c2a971cec1f82ea7a338ab4a368f37
SHA1 69b181896b53a27554a6535f61e1b1e785750f98
SHA256 04b8bb3fc2b3311f5027fa536ec480a3211cbc4673efde460f59daf44a7a1f55
SHA512 627ea3b4f030dc62fa13b8902dbc6d6e286e8ba93b08ae584f37d8dcc9933dfbe84dd27241510dd821bd58bb8f8621399cb85c4e35b35d7424c1e7be141fd80f

memory/1844-14-0x0000000073940000-0x000000007402E000-memory.dmp

memory/1644-15-0x0000000073940000-0x000000007402E000-memory.dmp

memory/1644-16-0x0000000005530000-0x0000000005540000-memory.dmp

memory/1644-18-0x0000000006A60000-0x0000000006A6A000-memory.dmp

memory/1644-19-0x0000000073940000-0x000000007402E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-12 18:55

Reported

2024-04-12 18:58

Platform

win10v2004-20240412-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client-built.exe

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "SubClient.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Client-built.exe" /rl HIGHEST /f

C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe

"C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "SubClient.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe" /rl HIGHEST /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 Lunasplanet-29399.portmap.host udp
DE 193.161.193.99:29399 Lunasplanet-29399.portmap.host tcp
US 8.8.8.8:53 99.193.161.193.in-addr.arpa udp
US 8.8.8.8:53 43.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/212-0-0x00000000748E0000-0x0000000075090000-memory.dmp

memory/212-1-0x0000000000AB0000-0x0000000000B0E000-memory.dmp

memory/212-2-0x0000000005BD0000-0x0000000006174000-memory.dmp

memory/212-3-0x0000000005560000-0x00000000055F2000-memory.dmp

memory/212-4-0x00000000054B0000-0x00000000054C0000-memory.dmp

memory/212-5-0x0000000005620000-0x0000000005686000-memory.dmp

memory/212-6-0x0000000005B70000-0x0000000005B82000-memory.dmp

memory/212-7-0x0000000006760000-0x000000000679C000-memory.dmp

C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe

MD5 46c2a971cec1f82ea7a338ab4a368f37
SHA1 69b181896b53a27554a6535f61e1b1e785750f98
SHA256 04b8bb3fc2b3311f5027fa536ec480a3211cbc4673efde460f59daf44a7a1f55
SHA512 627ea3b4f030dc62fa13b8902dbc6d6e286e8ba93b08ae584f37d8dcc9933dfbe84dd27241510dd821bd58bb8f8621399cb85c4e35b35d7424c1e7be141fd80f

memory/212-15-0x00000000748E0000-0x0000000075090000-memory.dmp

memory/2300-14-0x00000000748E0000-0x0000000075090000-memory.dmp

memory/2300-16-0x0000000005220000-0x0000000005230000-memory.dmp

memory/2300-18-0x00000000068C0000-0x00000000068CA000-memory.dmp

memory/2300-19-0x00000000748E0000-0x0000000075090000-memory.dmp

memory/2300-20-0x0000000005220000-0x0000000005230000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-12 18:55

Reported

2024-04-12 18:58

Platform

win11-20240412-en

Max time kernel

90s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client-built.exe

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "SubClient.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Client-built.exe" /rl HIGHEST /f

C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe

"C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks" /create /tn "SubClient.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe" /rl HIGHEST /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 208.95.112.1:80 ip-api.com tcp
DE 193.161.193.99:29399 Lunasplanet-29399.portmap.host tcp

Files

memory/4648-0-0x0000000000A90000-0x0000000000AEE000-memory.dmp

memory/4648-1-0x0000000074480000-0x0000000074C31000-memory.dmp

memory/4648-2-0x0000000005BB0000-0x0000000006156000-memory.dmp

memory/4648-3-0x0000000005600000-0x0000000005692000-memory.dmp

memory/4648-4-0x0000000005730000-0x0000000005740000-memory.dmp

memory/4648-5-0x00000000056A0000-0x0000000005706000-memory.dmp

memory/4648-6-0x0000000005B20000-0x0000000005B32000-memory.dmp

memory/4648-7-0x0000000006830000-0x000000000686C000-memory.dmp

C:\Users\Admin\AppData\Roaming\SubDir\SubClient.exe

MD5 46c2a971cec1f82ea7a338ab4a368f37
SHA1 69b181896b53a27554a6535f61e1b1e785750f98
SHA256 04b8bb3fc2b3311f5027fa536ec480a3211cbc4673efde460f59daf44a7a1f55
SHA512 627ea3b4f030dc62fa13b8902dbc6d6e286e8ba93b08ae584f37d8dcc9933dfbe84dd27241510dd821bd58bb8f8621399cb85c4e35b35d7424c1e7be141fd80f

memory/2584-14-0x0000000074480000-0x0000000074C31000-memory.dmp

memory/2584-16-0x00000000050A0000-0x00000000050B0000-memory.dmp

memory/4648-15-0x0000000074480000-0x0000000074C31000-memory.dmp

memory/2584-18-0x0000000006700000-0x000000000670A000-memory.dmp

memory/2584-19-0x0000000074480000-0x0000000074C31000-memory.dmp