Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 11:53
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240220-en
General
-
Target
Client-built.exe
-
Size
3.4MB
-
MD5
5563db885f9dff8a21515399173729af
-
SHA1
699f3b02b8708ff390bea58f92380610aef1a016
-
SHA256
a7213d2f57e96c1cc5e026f53eae26941ef1d64bdb3a588a96b81a3cbef92548
-
SHA512
bae11f061c5bee115792c8e429b594b8d3980208c67a2f88ea76ccbf298e26978c57f1b32b564e2585c60e9c711d043c20e11f461b887fb1c30eb2731ed9aaac
-
SSDEEP
98304:CvY62XlaSFNWPjljiFXRoUYIjhRJ6Dux:kQZYsC
Malware Config
Extracted
quasar
1.4.1
Office04
gaykami.zapto.org:4782
fd070244-4e4f-464f-bf66-b0519c62cf67
-
encryption_key
D408429A8F1C644E0A5D5AD709BD41BEADE3C3F6
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/memory/2204-0-0x0000000000A70000-0x0000000000DD6000-memory.dmp family_quasar behavioral1/files/0x003000000001233b-6.dat family_quasar behavioral1/memory/2564-10-0x00000000008D0000-0x0000000000C36000-memory.dmp family_quasar behavioral1/memory/1972-16-0x0000000000CB0000-0x0000000001016000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2564 Client.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\SubDir\Client.exe Client-built.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client-built.exe File opened for modification C:\Windows\system32\SubDir Client-built.exe File opened for modification C:\Windows\system32\SubDir\Client.exe Client.exe File opened for modification C:\Windows\system32\SubDir Client.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe 2548 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2204 Client-built.exe Token: SeDebugPrivilege 2564 Client.exe Token: 33 3028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3028 AUDIODG.EXE Token: 33 3028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3028 AUDIODG.EXE Token: SeDebugPrivilege 1972 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2564 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2564 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2508 2204 Client-built.exe 28 PID 2204 wrote to memory of 2508 2204 Client-built.exe 28 PID 2204 wrote to memory of 2508 2204 Client-built.exe 28 PID 2204 wrote to memory of 2564 2204 Client-built.exe 30 PID 2204 wrote to memory of 2564 2204 Client-built.exe 30 PID 2204 wrote to memory of 2564 2204 Client-built.exe 30 PID 2564 wrote to memory of 2548 2564 Client.exe 31 PID 2564 wrote to memory of 2548 2564 Client.exe 31 PID 2564 wrote to memory of 2548 2564 Client.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2508
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2548
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2024
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD55563db885f9dff8a21515399173729af
SHA1699f3b02b8708ff390bea58f92380610aef1a016
SHA256a7213d2f57e96c1cc5e026f53eae26941ef1d64bdb3a588a96b81a3cbef92548
SHA512bae11f061c5bee115792c8e429b594b8d3980208c67a2f88ea76ccbf298e26978c57f1b32b564e2585c60e9c711d043c20e11f461b887fb1c30eb2731ed9aaac