Analysis
-
max time kernel
22s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:47
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Client.exe
-
Size
3.1MB
-
MD5
f4d2c8d8d68a3498b8c35174f5f30aa8
-
SHA1
c0122df8b964874689ef0b22846719af39c02713
-
SHA256
08f02ffe7eeff88badfd144cf74b3b3fbd7319b1c31f6f72b7aeda5613020bbc
-
SHA512
14bbc1dfda168567392cac4311279ea9271d531f143fe5e5c015d509829dff4312ea45b413111a507f0f1baa8037ec6c98a0be09a38dd6f5f22e90768fb3ae8b
-
SSDEEP
49152:agwNiXIBaIGNydScbKPLhtJ6IX2cCDXsch9HHBE2VhGNT:Hci4BjScb+FtoIX2R
Malware Config
Extracted
Family
quasar
Attributes
-
reconnect_delay
5000
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-1-0x00000000009E0000-0x0000000000D08000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Client.exedescription pid process target process PID 2112 created 2656 2112 Client.exe TrustedInstaller.exe -
Drops file in Windows directory 1 IoCs
Processes:
makecab.exedescription ioc process File created C:\Windows\Logs\CBS\CbsPersist_20240513164801.cab makecab.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Client.exepid process 2112 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client.exedescription pid process Token: SeDebugPrivilege 2112 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Client.exeClient.exedescription pid process target process PID 2112 wrote to memory of 2568 2112 Client.exe Client.exe PID 2112 wrote to memory of 2568 2112 Client.exe Client.exe PID 2112 wrote to memory of 2568 2112 Client.exe Client.exe PID 2568 wrote to memory of 3044 2568 Client.exe WerFault.exe PID 2568 wrote to memory of 3044 2568 Client.exe WerFault.exe PID 2568 wrote to memory of 3044 2568 Client.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:2656
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240513164801.log C:\Windows\Logs\CBS\CbsPersist_20240513164801.cab2⤵
- Drops file in Windows directory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2568 -s 683⤵PID:3044
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2620
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:860