Overview
overview
10Static
static
10Quasar_Gol...C2.dll
windows7-x64
1Quasar_Gol...C2.dll
windows10-2004-x64
1Quasar_Gol...C3.dll
windows7-x64
3Quasar_Gol...C3.dll
windows10-2004-x64
3Quasar_Gol...ck.dll
windows7-x64
1Quasar_Gol...ck.dll
windows10-2004-x64
1Quasar_Gol...in.dll
windows7-x64
1Quasar_Gol...in.dll
windows10-2004-x64
1Quasar_Gol...in.dll
windows7-x64
1Quasar_Gol...in.dll
windows10-2004-x64
1Quasar_Gol...in.dll
windows7-x64
1Quasar_Gol...in.dll
windows10-2004-x64
1Quasar_Gol...le.exe
windows7-x64
10Quasar_Gol...le.exe
windows10-2004-x64
10Quasar_Gol...or.exe
windows7-x64
10Quasar_Gol...or.exe
windows10-2004-x64
10Quasar_Gol...ss.exe
windows7-x64
1Quasar_Gol...ss.exe
windows10-2004-x64
1Quasar_Gol...il.dll
windows7-x64
1Quasar_Gol...il.dll
windows10-2004-x64
1Quasar_Gol...at.dll
windows7-x64
1Quasar_Gol...at.dll
windows10-2004-x64
1Quasar_Gol...AT.exe
windows7-x64
10Quasar_Gol...AT.exe
windows10-2004-x64
10Quasar_Gol...ib.dll
windows7-x64
1Quasar_Gol...ib.dll
windows10-2004-x64
1Quasar_Gol...nt.exe
windows7-x64
10Quasar_Gol...nt.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 07:15
Behavioral task
behavioral1
Sample
Quasar_Gold/Include/NCC2.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Quasar_Gold/Include/NCC2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Quasar_Gold/Include/NCC3.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Quasar_Gold/Include/NCC3.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Quasar_Gold/Include/NCCheck.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Quasar_Gold/Include/NCCheck.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
Quasar_Gold/Include/VS08ReactorAddin.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Quasar_Gold/Include/VS08ReactorAddin.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Quasar_Gold/Include/VS13ReactorAddin.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Quasar_Gold/Include/VS13ReactorAddin.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
Quasar_Gold/Include/VSReactorAddin.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Quasar_Gold/Include/VSReactorAddin.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Quasar_Gold/Include/dotNET_Reactor.Console.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Quasar_Gold/Include/dotNET_Reactor.Console.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Quasar_Gold/Include/dotNET_Reactor.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Quasar_Gold/Include/dotNET_Reactor.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
Quasar_Gold/Include/mpress.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
Quasar_Gold/Include/mpress.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
Quasar_Gold/Mono.Cecil.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
Quasar_Gold/Mono.Cecil.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
Quasar_Gold/Mono.Nat.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Quasar_Gold/Mono.Nat.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
Quasar_Gold/QuasarRAT.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Quasar_Gold/QuasarRAT.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Quasar_Gold/Vestris.ResourceLib.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Quasar_Gold/Vestris.ResourceLib.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
Quasar_Gold/client.exe
Resource
win7-20240221-en
General
-
Target
Quasar_Gold/QuasarRAT.exe
-
Size
11.9MB
-
MD5
44b8fdbeac92e1b2e88085e33a296ac7
-
SHA1
120aff91f77e433a303288da47fcd8ccd9a62351
-
SHA256
a60c958fa5dda06d5b7e2002308d2398f3904d57488666ebc79932a041d40202
-
SHA512
293cb19c7ddc51092d5077dce39cc38426ca949006d160fc0b414b252c6fbeb01caffddebb7c8d1a4ab2284c3d8c020cbdeb121dedda4882f53d33a8c8b18778
-
SSDEEP
98304:/ZhqMpBUxERZSu66QVWqkLkUSYPVQarBN:/Z0MpB5/BDlF
Malware Config
Signatures
-
DarkTrack payload 15 IoCs
resource yara_rule behavioral23/memory/2984-18-0x0000000004C90000-0x0000000004D4A000-memory.dmp family_darktrack behavioral23/memory/2264-19-0x000000001B7B0000-0x000000001B830000-memory.dmp family_darktrack behavioral23/memory/576-43-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-49-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-52-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-53-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-54-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-57-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-58-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-59-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-60-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-50-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-47-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-48-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral23/memory/576-45-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Executes dropped EXE 3 IoCs
pid Process 2984 crypt.exe 2264 quasar golden edition.exe 2560 WinReg32.exe -
Loads dropped DLL 4 IoCs
pid Process 1712 QuasarRAT.exe 1712 QuasarRAT.exe 2984 crypt.exe 2560 WinReg32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\DwiDesk\\WinReg32.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2560 set thread context of 576 2560 WinReg32.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 576 cvtres.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2984 1712 QuasarRAT.exe 28 PID 1712 wrote to memory of 2984 1712 QuasarRAT.exe 28 PID 1712 wrote to memory of 2984 1712 QuasarRAT.exe 28 PID 1712 wrote to memory of 2984 1712 QuasarRAT.exe 28 PID 1712 wrote to memory of 2264 1712 QuasarRAT.exe 29 PID 1712 wrote to memory of 2264 1712 QuasarRAT.exe 29 PID 1712 wrote to memory of 2264 1712 QuasarRAT.exe 29 PID 1712 wrote to memory of 2264 1712 QuasarRAT.exe 29 PID 2984 wrote to memory of 2560 2984 crypt.exe 30 PID 2984 wrote to memory of 2560 2984 crypt.exe 30 PID 2984 wrote to memory of 2560 2984 crypt.exe 30 PID 2984 wrote to memory of 2560 2984 crypt.exe 30 PID 2560 wrote to memory of 2932 2560 WinReg32.exe 31 PID 2560 wrote to memory of 2932 2560 WinReg32.exe 31 PID 2560 wrote to memory of 2932 2560 WinReg32.exe 31 PID 2560 wrote to memory of 2932 2560 WinReg32.exe 31 PID 2932 wrote to memory of 1172 2932 cmd.exe 33 PID 2932 wrote to memory of 1172 2932 cmd.exe 33 PID 2932 wrote to memory of 1172 2932 cmd.exe 33 PID 2932 wrote to memory of 1172 2932 cmd.exe 33 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34 PID 2560 wrote to memory of 576 2560 WinReg32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quasar_Gold\QuasarRAT.exe"C:\Users\Admin\AppData\Local\Temp\Quasar_Gold\QuasarRAT.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\crypt.exe"C:\Users\Admin\AppData\Local\Temp\crypt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\WinReg32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\WinReg32.exe" -n3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\WinReg32.lnk" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\WinReg32.lnk" /f5⤵
- Adds Run key to start application
PID:1172
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\quasar golden edition.exe"C:\Users\Admin\AppData\Local\Temp\quasar golden edition.exe"2⤵
- Executes dropped EXE
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
869KB
MD5245468fca16ae49742f45a95ce4d5a8a
SHA1b8b77c9d0b1b9a8bbfee75cd7c3b5c0e04b7e3b2
SHA2563254a31f92cf401165691c882186768b4a8d1a958e55a11fb50447d5f5d37599
SHA5120432027fcc54c6e51529820bee810c552e006382d71b37a09de80261163f7c6becb0de2ee0dce9a54c1291bb47e0961160a5957ec2fa98e88e339c6f56ff7041
-
Filesize
448KB
MD5fc67d1c1a7ef2b879da2cbe4e4bb02f9
SHA16b2b9814891d18b8fa885bca0dcc634a48dea495
SHA256319036fbdf822e25a0f651ab3af22b0c1be632392da66309430a17915320a38f
SHA5123ebf22e6615807a2d7e70e1b9743d1057011e62b0bbd6ed69d6c97bbb9dab7ccf1febbfc31a5e1c65a00a2de2850dd5beb8d7423f7f02a3b3216a55b71c6cc3f
-
Filesize
448KB
MD5fb619f3df9e2af1c96cf416fcb60dfbe
SHA157d860ee02fdb208a7275259f6fe92f4343f74d8
SHA256324f79daa3b0f38aeaf00c76d8527ec4bb6223320ad3f7c03778307f2fbfda1a
SHA51203a88cd4429890235f71bc8e542c2d1d85f39f4c23dddb48d3bc43bbac4b29b5fec303ea221e75edd9a81595b428936d7f0deafb73135da235e65f0a976f8c36
-
Filesize
512KB
MD56d1c194b2ebbd0495ebf4ee4dbbb548f
SHA1815eb5ad86eae2d806dc0c6f2f2f136f581040c9
SHA256da0aa339ebb793f81aa0dbf7e15836cb2ace1d86a716a6040f7016fa2fc3209a
SHA51242de2db18f99857d7f3b839c396068732a04555b0fbc2f170a466f77268578b0837ec2d5bcdbd060e2ca67dde9671f8acb4af52cda61f742c6aa3edc41a7a022
-
Filesize
704KB
MD52dcb3199f7d6068e9bbab31050570467
SHA1b64d597c1f348ff81b1f954a2e72b1e5bea3648f
SHA25655f126dc25741f1a5c1e7d5697697ce39dbc11d07f654cf31a5c64068cb4f52d
SHA5127db90e37468e890bdd3b2ce288babff8fd832e773afaa6fcbc6544945bca7a46395dbb62c26cdc22fa08f48af4d7d39bb25998d40d1261390dbf28179bd817fc
-
Filesize
192KB
MD5ce06dc1f407780b8a88523da09c55a93
SHA1c8c9b7949cea2848eb60f08d31ee62e184bc189b
SHA256b49bb55e3796861470410b477de32ab7cb6f1922cab24580a16464ead48ec624
SHA512344125ce69215f9ce61f4ea615167674e741a40c98b1008041e23798a649c9047d8cdf9d1355f157cd8b251cc31e5a4bad5a193eff72039b24f843e92dc53a90