Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 16:30
Behavioral task
behavioral1
Sample
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe
Resource
win7-20240220-en
General
-
Target
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe
-
Size
3.1MB
-
MD5
f73c79f1b3f1baaf66b5217591617996
-
SHA1
7adf50ec4e343c7c890f360041206146bd166807
-
SHA256
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e
-
SHA512
5ca6289d009234ce50b4fdbecb2c51898c812b7175af6d7753ffcdfac94c849530b13346b903d8b8f7fad240835c957fda0421fa73e97a1943410da3eb00a426
-
SSDEEP
49152:PvFG42pda6D+/PjlLOlg6yQipV5PRJ6ebR3LoGdhTHHB72eh2NT:Pv842pda6D+/PjlLOlZyQipV5PRJ6Y
Malware Config
Extracted
quasar
1.4.1
Office04
10.128.49.236:4783
10.128.49.71:4783
127.0.0.1:4783
eeb9accf-baef-479b-ac89-0eaf9d0c2e80
-
encryption_key
7C1BD457B9B162A1B4E9153B6861CCB30916DB14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/3068-1-0x00000000001C0000-0x00000000004E4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3068 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3068 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3068 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe"C:\Users\Admin\AppData\Local\Temp\c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3068