Analysis

  • max time kernel
    330s
  • max time network
    325s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 00:55

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    4154355d39cb3f7ec6be0222e2508773

  • SHA1

    d1b57f612acddc4c59bf901a5bf74df5ade13280

  • SHA256

    7dae1d89f38e6fd6cd87d4c6619573ac8c0140af985896ad553cac26edc3b78a

  • SHA512

    1efcd1714c72d0569e579e3746b057bf076a31a655148e31d8366a74912be2b57e6d00dfa75e0e770de9cee6959383a5bda630abae20530425c39e63769ac49e

  • SSDEEP

    49152:3vrI22SsaNYfdPBldt698dBcjHSv41mzpEoGdVHTHHB72eh2NT:3vU22SsaNYfdPBldt6+dBcjHK4b

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

lolimaginerattin24-26181.portmap.host:26181

Mutex

5322b71c-e6d1-4271-a40e-ed1736164335

Attributes
  • encryption_key

    9C4EA8E0DF89BE6122CBCA3F1DCCDAE968F75366

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    msservice

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Gathers network information 2 TTPs 9 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "msservice" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Creates scheduled task(s)
      PID:1120
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "msservice" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2680
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd" /K CHCP 437
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4452
        • C:\Windows\system32\chcp.com
          CHCP 437
          4⤵
            PID:1812
          • C:\Windows\system32\ipconfig.exe
            ipconfig
            4⤵
            • Gathers network information
            PID:1120
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3044
      • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
        "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4708
      • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
        "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4780
      • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
        "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2584
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\system32\ipconfig.exe
          ipconfig
          2⤵
          • Gathers network information
          PID:4564
        • C:\Windows\system32\NETSTAT.EXE
          netstat /nbf
          2⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:2684
        • C:\Windows\system32\NETSTAT.EXE
          netstat - ano
          2⤵
          • Gathers network information
          PID:4116
        • C:\Windows\system32\NETSTAT.EXE
          netstat -ano
          2⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:2180
        • C:\Windows\system32\NETSTAT.EXE
          netstat -a
          2⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:4524
        • C:\Windows\system32\NETSTAT.EXE
          netstat -b
          2⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:3040
        • C:\Windows\system32\NETSTAT.EXE
          netstat -bn
          2⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:2964
        • C:\Windows\system32\NETSTAT.EXE
          netstat -bno
          2⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:3584

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client-built.exe.log

        Filesize

        1KB

        MD5

        baf55b95da4a601229647f25dad12878

        SHA1

        abc16954ebfd213733c4493fc1910164d825cac8

        SHA256

        ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

        SHA512

        24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

        Filesize

        3.1MB

        MD5

        4154355d39cb3f7ec6be0222e2508773

        SHA1

        d1b57f612acddc4c59bf901a5bf74df5ade13280

        SHA256

        7dae1d89f38e6fd6cd87d4c6619573ac8c0140af985896ad553cac26edc3b78a

        SHA512

        1efcd1714c72d0569e579e3746b057bf076a31a655148e31d8366a74912be2b57e6d00dfa75e0e770de9cee6959383a5bda630abae20530425c39e63769ac49e

      • memory/564-11-0x00007FF900190000-0x00007FF900C51000-memory.dmp

        Filesize

        10.8MB

      • memory/564-9-0x00007FF900190000-0x00007FF900C51000-memory.dmp

        Filesize

        10.8MB

      • memory/564-12-0x000000001C590000-0x000000001C5E0000-memory.dmp

        Filesize

        320KB

      • memory/564-13-0x000000001C6A0000-0x000000001C752000-memory.dmp

        Filesize

        712KB

      • memory/564-16-0x000000001D2D0000-0x000000001D7F8000-memory.dmp

        Filesize

        5.2MB

      • memory/564-17-0x000000001C600000-0x000000001C612000-memory.dmp

        Filesize

        72KB

      • memory/564-18-0x000000001C660000-0x000000001C69C000-memory.dmp

        Filesize

        240KB

      • memory/564-21-0x00007FF900190000-0x00007FF900C51000-memory.dmp

        Filesize

        10.8MB

      • memory/3108-2-0x00007FF900190000-0x00007FF900C51000-memory.dmp

        Filesize

        10.8MB

      • memory/3108-10-0x00007FF900190000-0x00007FF900C51000-memory.dmp

        Filesize

        10.8MB

      • memory/3108-1-0x00007FF900193000-0x00007FF900195000-memory.dmp

        Filesize

        8KB

      • memory/3108-0-0x00000000005B0000-0x00000000008D4000-memory.dmp

        Filesize

        3.1MB