Analysis
-
max time kernel
140s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 17:53
Behavioral task
behavioral1
Sample
65ea4d9daebf85054243db23a85163e0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65ea4d9daebf85054243db23a85163e0.exe
Resource
win10v2004-20240508-en
General
-
Target
65ea4d9daebf85054243db23a85163e0.exe
-
Size
3.1MB
-
MD5
65ea4d9daebf85054243db23a85163e0
-
SHA1
5974084a8e436c90cc5227e17423c62ae7d982f8
-
SHA256
0170695628a300a03e01da6352aa80d75dac69694a65d5962aaf1bdb89191095
-
SHA512
db83f073e73a4b83fbf78390b53ce4d4965058f0f5cb5f1406908d321c65d3999ea0f0476d711110bbc4bfdd80fdd0611474018e65831d3ff810ce6281806f25
-
SSDEEP
49152:mvulL26AaNeWgPhlmVqvMQ7XSKhr/qQBxCLoGdqiOTHHB72eh2NT:mveL26AaNeWgPhlmVqkQ7XSKB/s
Malware Config
Extracted
quasar
1.4.1
aldo_R3GON
peurnick24.bumbleshrimp.com:7310
77413eeb-5d1c-4bf8-986f-3c9d48a16cd6
-
encryption_key
A3226D93494A561FEC5149605B952B09B55012C6
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3456-1-0x0000000000020000-0x0000000000344000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
65ea4d9daebf85054243db23a85163e0.exedescription pid process Token: SeDebugPrivilege 3456 65ea4d9daebf85054243db23a85163e0.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
65ea4d9daebf85054243db23a85163e0.exepid process 3456 65ea4d9daebf85054243db23a85163e0.exe 3456 65ea4d9daebf85054243db23a85163e0.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
65ea4d9daebf85054243db23a85163e0.exepid process 3456 65ea4d9daebf85054243db23a85163e0.exe 3456 65ea4d9daebf85054243db23a85163e0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
65ea4d9daebf85054243db23a85163e0.exepid process 3456 65ea4d9daebf85054243db23a85163e0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65ea4d9daebf85054243db23a85163e0.exe"C:\Users\Admin\AppData\Local\Temp\65ea4d9daebf85054243db23a85163e0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3456