Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:03
Behavioral task
behavioral1
Sample
83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe
Resource
win7-20240221-en
General
-
Target
83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe
-
Size
348KB
-
MD5
0a7dccc3c8dd419560ac4bdb8440b77a
-
SHA1
74a2fe4ca4888ac962b1737af6dc2b58f78048c7
-
SHA256
83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce
-
SHA512
637b9a964954b52986eea5fecc4093ac57f7bff690220bc0f0785c043d327259ba2c372b2c0fba1ec5588fc66bda593009fb8f74b3915fc3561e7fda9b92787c
-
SSDEEP
6144:+rNHXf500MsbudVpDxWUb2Nsto/pKujjY/R3K:Yd505dVyrsWMuvYZ3K
Malware Config
Extracted
quasar
1.3.0.0
Office04
qztadmin.duckdns.org:9782
QSR_MUTEX_YMblzlA3rm38L7nnxQ
-
encryption_key
mDf8ODHd9XwqMsIxpY8F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5008-0-0x0000000000CE0000-0x0000000000D3E000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exedescription pid process Token: SeDebugPrivilege 5008 83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exepid process 5008 83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe"C:\Users\Admin\AppData\Local\Temp\83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5008