Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 16:30
Behavioral task
behavioral1
Sample
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe
Resource
win7-20240220-en
General
-
Target
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe
-
Size
3.1MB
-
MD5
f73c79f1b3f1baaf66b5217591617996
-
SHA1
7adf50ec4e343c7c890f360041206146bd166807
-
SHA256
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e
-
SHA512
5ca6289d009234ce50b4fdbecb2c51898c812b7175af6d7753ffcdfac94c849530b13346b903d8b8f7fad240835c957fda0421fa73e97a1943410da3eb00a426
-
SSDEEP
49152:PvFG42pda6D+/PjlLOlg6yQipV5PRJ6ebR3LoGdhTHHB72eh2NT:Pv842pda6D+/PjlLOlZyQipV5PRJ6Y
Malware Config
Extracted
quasar
1.4.1
Office04
10.128.49.236:4783
10.128.49.71:4783
127.0.0.1:4783
eeb9accf-baef-479b-ac89-0eaf9d0c2e80
-
encryption_key
7C1BD457B9B162A1B4E9153B6861CCB30916DB14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/232-1-0x0000000000F50000-0x0000000001274000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exedescription pid process Token: SeDebugPrivilege 232 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exepid process 232 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exepid process 232 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exepid process 232 c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe"C:\Users\Admin\AppData\Local\Temp\c66da9e2a3e32a7b16c561e89623411d329bedb69a9d80f12ebfff7ba94a0e3e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:232