Analysis

  • max time kernel
    140s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2024 16:17

General

  • Target

    6406cf5b9e7e6cbddf902322bd13c02f01b6a3335fbf53d839e740469ed9fc9e.exe

  • Size

    3.2MB

  • MD5

    6f1434bdc116473171a42f081f86d2e5

  • SHA1

    68dc8a913caaddbcd9dd976f478cba38935d1681

  • SHA256

    6406cf5b9e7e6cbddf902322bd13c02f01b6a3335fbf53d839e740469ed9fc9e

  • SHA512

    f7593f9d5033e816eb00eebd987a261b307443cb534763ab73c25ff640454aed06fb8651eb7a3c9a2b6750ed03891590cfa024425f948e2e87cb9950590fd70e

  • SSDEEP

    98304:ahfos5HeMop9TM2EmSgFUMwCY7BtAFBsABH3:cfHHeMop9TM2ceUXN77Ksi3

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

93.123.85.108:4782

Mutex

e14b8f59-979b-4ebf-8602-dd3c4d6c301e

Attributes
  • encryption_key

    534734397C0FA9A1D28F061AD75DF4100BFF5787

  • install_name

    Msconfig.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    msconfig.exe

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6406cf5b9e7e6cbddf902322bd13c02f01b6a3335fbf53d839e740469ed9fc9e.exe
    "C:\Users\Admin\AppData\Local\Temp\6406cf5b9e7e6cbddf902322bd13c02f01b6a3335fbf53d839e740469ed9fc9e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "msconfig.exe" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Msconfig.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2032
      • C:\Windows\SysWOW64\SubDir\Msconfig.exe
        "C:\Windows\system32\SubDir\Msconfig.exe"
        3⤵
        • Executes dropped EXE
        PID:4344
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\MicrosoftTools"
      2⤵
        PID:4828
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\MicrosoftTools\MicrosoftTools.exe'" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:712
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\MicrosoftTools\MicrosoftTools.exe'" /f
          3⤵
          • Creates scheduled task(s)
          PID:2100
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\6406cf5b9e7e6cbddf902322bd13c02f01b6a3335fbf53d839e740469ed9fc9e.exe" "C:\Users\Admin\AppData\Roaming\MicrosoftTools\MicrosoftTools.exe"
        2⤵
          PID:5064

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\SubDir\Msconfig.exe

        Filesize

        2.5MB

        MD5

        0a7608db01cae07792cea95e792aa866

        SHA1

        71dff876e4d5edb6cea78fee7aa15845d4950e24

        SHA256

        c16336ab32195b08c1678220fbe0256fee865f623e2b32fcfa4d9825fd68977e

        SHA512

        990a6fa1b8adb6727b1dcd8931ad84fdcb556533b78f896a71eae2a7e3ae3222e4b8efaa4b629ced2841211750e0d8a75ddd546a983c2e586918dd8ba4e0dc42

      • memory/2400-11-0x0000000074A00000-0x00000000751B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2400-7-0x0000000000970000-0x0000000000C94000-memory.dmp

        Filesize

        3.1MB

      • memory/2400-8-0x0000000074A00000-0x00000000751B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2400-9-0x0000000005550000-0x00000000055E2000-memory.dmp

        Filesize

        584KB

      • memory/2400-10-0x0000000005470000-0x000000000547A000-memory.dmp

        Filesize

        40KB

      • memory/2400-20-0x0000000074A00000-0x00000000751B0000-memory.dmp

        Filesize

        7.7MB

      • memory/3188-2-0x0000000005B70000-0x0000000006114000-memory.dmp

        Filesize

        5.6MB

      • memory/3188-3-0x0000000074A00000-0x00000000751B0000-memory.dmp

        Filesize

        7.7MB

      • memory/3188-4-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

        Filesize

        4KB

      • memory/3188-5-0x0000000074A00000-0x00000000751B0000-memory.dmp

        Filesize

        7.7MB

      • memory/3188-0-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

        Filesize

        4KB

      • memory/3188-13-0x0000000074A00000-0x00000000751B0000-memory.dmp

        Filesize

        7.7MB

      • memory/3188-1-0x00000000008C0000-0x0000000000BF0000-memory.dmp

        Filesize

        3.2MB