Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 14:35
Behavioral task
behavioral1
Sample
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe
Resource
win10v2004-20240508-en
General
-
Target
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe
-
Size
3.1MB
-
MD5
87bf8eb962d3eaf56335a996eb0c2762
-
SHA1
4d9abe61ca7bd301d6c129ca526f81e3a5271091
-
SHA256
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91
-
SHA512
b3d0d8d233f1a7edf6054f918759995ddc29150d4dda6d62ef6f955492e063efa6c22d4acf6cabbea3a845c02773b70d6eda5fbb9262c0a75cac7210146325f0
-
SSDEEP
49152:OvbI22SsaNYfdPBldt698dBcjHMgxNESErk/ivLoGdwGTHHB72eh2NT:Ovk22SsaNYfdPBldt6+dBcjHjx6z
Malware Config
Extracted
quasar
1.4.1
Office04
7.tcp.eu.ngrok.io:13231
0e48a3c0-ec07-40d4-9510-7c0b54727d37
-
encryption_key
8BCC1AD76EF38CD8450D4884BA579580305F0B81
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2372-1-0x00000000007A0000-0x0000000000AC4000-memory.dmp family_quasar -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exedescription pid process Token: SeDebugPrivilege 2372 6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exepid process 2372 6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exepid process 2372 6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe"C:\Users\Admin\AppData\Local\Temp\6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2372