Analysis
-
max time kernel
50s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 17:12
General
-
Target
Client-built.exe
-
Size
3.2MB
-
MD5
284e0833f30177b1f5b2600ef6d2753c
-
SHA1
ab0d79ac14db531c1e8608d30c850c7b7b1e3656
-
SHA256
1fe995e836f0298728468bd5e6380fe5c9c8a823aa37762305ac7b4b5e110a03
-
SHA512
22ca084993478b8ac9955e3824ad0c39da843b40a275905e992d8008bd8d746691b71cf8a6f51f6abe7bfad288b8b40b13f7069b1442118f2250f54db14d4d06
-
SSDEEP
49152:GvyI22SsaNYfdPBldt698dBcjH5hRJ6GbR3LoGdV4THHB72eh2NTw:Gvf22SsaNYfdPBldt6+dBcjH5hRJ6AA
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
46.125.249.62:4782
Mutex
a40814bd-3635-4179-9c1b-2eb3cb2a0abd
Attributes
-
encryption_key
3ACA51703839A9056B97F8F1EB01D62FE0EA2155
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2996-1-0x0000000000E30000-0x0000000001160000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 2996 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Client-built.exepid process 2996 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Client-built.exepid process 2996 Client-built.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client-built.exepid process 2996 Client-built.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2996-0-0x00007FFA85653000-0x00007FFA85655000-memory.dmpFilesize
8KB
-
memory/2996-1-0x0000000000E30000-0x0000000001160000-memory.dmpFilesize
3.2MB
-
memory/2996-2-0x00007FFA85650000-0x00007FFA86111000-memory.dmpFilesize
10.8MB
-
memory/2996-3-0x000000001DA60000-0x000000001DAB0000-memory.dmpFilesize
320KB
-
memory/2996-4-0x000000001DB70000-0x000000001DC22000-memory.dmpFilesize
712KB
-
memory/2996-5-0x00007FFA85653000-0x00007FFA85655000-memory.dmpFilesize
8KB
-
memory/2996-6-0x00007FFA85650000-0x00007FFA86111000-memory.dmpFilesize
10.8MB