Analysis
-
max time kernel
95s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 04:33
General
-
Target
server.exe
-
Size
3.1MB
-
MD5
07dccd8779b74ad4a54626bcd2cb3bef
-
SHA1
f433850738d4a26367da7596b73003200053362c
-
SHA256
5800caf82a36637733bfcbf94ff7d84a94b9aed9219e379f8a7fd0fdb9ba2f65
-
SHA512
4c9c9c9801f62fc8ad811e0e0f46eed808fb2085470f6ba82e1d8319f27459731ef8a77db8cc4be389c452816156bcdcf1a0e0e709b5559b0a072601e9f65cbc
-
SSDEEP
49152:3vGlL26AaNeWgPhlmVqvMQ7XSKZoRJ64bR3LoGdZtTHHB72eh2NT:3vGL26AaNeWgPhlmVqkQ7XSKZoRJ6SJ
Malware Config
Extracted
quasar
1.4.1
@123
mother-amanda.gl.at.ply.gg:21734
9e934c1b-08a6-4685-bb6a-de27a875f421
-
encryption_key
8E8D64935A72F87FC7C5AD95C61A6C59BC55CDA1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1844-1-0x00000000008A0000-0x0000000000BC4000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
server.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation server.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
server.exedescription pid process Token: SeDebugPrivilege 1844 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
server.exepid process 1844 server.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
server.execmd.exedescription pid process target process PID 1844 wrote to memory of 5104 1844 server.exe cmd.exe PID 1844 wrote to memory of 5104 1844 server.exe cmd.exe PID 5104 wrote to memory of 2988 5104 cmd.exe chcp.com PID 5104 wrote to memory of 2988 5104 cmd.exe chcp.com PID 5104 wrote to memory of 1360 5104 cmd.exe PING.EXE PID 5104 wrote to memory of 1360 5104 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5nQSobDSnm4Q.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650013⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5nQSobDSnm4Q.batFilesize
207B
MD5921e455f26e61d7135292ac764c30902
SHA18d995a29d6b0fc7901de52e69b507fbfedf0504c
SHA256e1518a3cf8f245934c2e80a29b46708b343ea3951738ffab8aac2894075da841
SHA512d31135eca5d069e1694e119ef52f7b13af723dbbf1fcb18886e91a0f4d39bd0b7ab20900dfbcf210752de23de6dc56d6d76a6738ba81af88c525468b70ac91c5
-
memory/1844-0-0x00007FFCF9A73000-0x00007FFCF9A75000-memory.dmpFilesize
8KB
-
memory/1844-1-0x00000000008A0000-0x0000000000BC4000-memory.dmpFilesize
3.1MB
-
memory/1844-2-0x00007FFCF9A70000-0x00007FFCFA531000-memory.dmpFilesize
10.8MB
-
memory/1844-3-0x000000001B740000-0x000000001B790000-memory.dmpFilesize
320KB
-
memory/1844-4-0x000000001BF80000-0x000000001C032000-memory.dmpFilesize
712KB
-
memory/1844-5-0x000000001B7B0000-0x000000001B7C2000-memory.dmpFilesize
72KB
-
memory/1844-6-0x000000001B930000-0x000000001B96C000-memory.dmpFilesize
240KB
-
memory/1844-7-0x00007FFCF9A73000-0x00007FFCF9A75000-memory.dmpFilesize
8KB
-
memory/1844-8-0x00007FFCF9A70000-0x00007FFCFA531000-memory.dmpFilesize
10.8MB
-
memory/1844-13-0x00007FFCF9A70000-0x00007FFCFA531000-memory.dmpFilesize
10.8MB