Analysis

  • max time kernel
    134s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 20:01

General

  • Target

    26ffd4411e2de8652d06eede088fc40d37053dea0f5c191825604b3ad5e387f2.exe

  • Size

    1.3MB

  • MD5

    748f09b3b11ee9e70eb15aa0bd0cfaab

  • SHA1

    c4095839b82ed122a435050245dc0f7b91807e8d

  • SHA256

    26ffd4411e2de8652d06eede088fc40d37053dea0f5c191825604b3ad5e387f2

  • SHA512

    cfa88e6866c808caadcf6c079bfae015ab518900570451fea73918f1baaf52c16ac9b40700a2db639e96acae1314eaff6fe45682e11ca4dd884db307b3fad74a

  • SSDEEP

    24576:X9wPXbAr8hRBBBYiLPzFfpBBBBBBBBBBBBb1U:X9g28hRBBBYiLLFfpBBBBBBBBBBBBb1

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26ffd4411e2de8652d06eede088fc40d37053dea0f5c191825604b3ad5e387f2.exe
    "C:\Users\Admin\AppData\Local\Temp\26ffd4411e2de8652d06eede088fc40d37053dea0f5c191825604b3ad5e387f2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4196
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 972
      2⤵
      • Program crash
      PID:2088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4196 -ip 4196
    1⤵
      PID:4636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4196-0-0x00000000750EE000-0x00000000750EF000-memory.dmp

      Filesize

      4KB

    • memory/4196-1-0x0000000000890000-0x00000000009DA000-memory.dmp

      Filesize

      1.3MB

    • memory/4196-2-0x0000000005840000-0x0000000005DE4000-memory.dmp

      Filesize

      5.6MB

    • memory/4196-3-0x0000000005290000-0x0000000005322000-memory.dmp

      Filesize

      584KB

    • memory/4196-4-0x00000000750E0000-0x0000000075890000-memory.dmp

      Filesize

      7.7MB

    • memory/4196-5-0x00000000750E0000-0x0000000075890000-memory.dmp

      Filesize

      7.7MB