Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-06-2024 04:34
Behavioral task
behavioral1
Sample
server.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20240226-en
General
-
Target
server.exe
-
Size
3.1MB
-
MD5
07dccd8779b74ad4a54626bcd2cb3bef
-
SHA1
f433850738d4a26367da7596b73003200053362c
-
SHA256
5800caf82a36637733bfcbf94ff7d84a94b9aed9219e379f8a7fd0fdb9ba2f65
-
SHA512
4c9c9c9801f62fc8ad811e0e0f46eed808fb2085470f6ba82e1d8319f27459731ef8a77db8cc4be389c452816156bcdcf1a0e0e709b5559b0a072601e9f65cbc
-
SSDEEP
49152:3vGlL26AaNeWgPhlmVqvMQ7XSKZoRJ64bR3LoGdZtTHHB72eh2NT:3vGL26AaNeWgPhlmVqkQ7XSKZoRJ6SJ
Malware Config
Extracted
quasar
1.4.1
@123
mother-amanda.gl.at.ply.gg:21734
9e934c1b-08a6-4685-bb6a-de27a875f421
-
encryption_key
8E8D64935A72F87FC7C5AD95C61A6C59BC55CDA1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4904-1-0x0000000000B20000-0x0000000000E44000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
server.exedescription pid process Token: SeDebugPrivilege 4904 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
server.exepid process 4904 server.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
server.execmd.exedescription pid process target process PID 4904 wrote to memory of 1712 4904 server.exe cmd.exe PID 4904 wrote to memory of 1712 4904 server.exe cmd.exe PID 1712 wrote to memory of 3160 1712 cmd.exe chcp.com PID 1712 wrote to memory of 3160 1712 cmd.exe chcp.com PID 1712 wrote to memory of 4028 1712 cmd.exe PING.EXE PID 1712 wrote to memory of 4028 1712 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E8PmdBltaGRX.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650013⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\E8PmdBltaGRX.batFilesize
207B
MD5f0a9db22d5bac84edf157bf28b450225
SHA1828ecc52aa284dff1db9fb8782555c663b4875e5
SHA256c3319d32543a7d2bad1a0d855a6e68dbccb30dee5c426c168ddfaae6758a9edc
SHA512a1d1523a4eff16e85bf76340d77a7a7fb6d81d5b94aa5da63ccbecbc265e1984752f2ee16e7dd52206b2e2dd4e8aec3e17c0ad0bc30af667f709c4df9ec265f3
-
memory/4904-0-0x00007FF97EED3000-0x00007FF97EED4000-memory.dmpFilesize
4KB
-
memory/4904-1-0x0000000000B20000-0x0000000000E44000-memory.dmpFilesize
3.1MB
-
memory/4904-2-0x00007FF97EED0000-0x00007FF97F8BC000-memory.dmpFilesize
9.9MB
-
memory/4904-3-0x000000001BE90000-0x000000001BEE0000-memory.dmpFilesize
320KB
-
memory/4904-4-0x000000001BFA0000-0x000000001C052000-memory.dmpFilesize
712KB
-
memory/4904-7-0x000000001BF10000-0x000000001BF22000-memory.dmpFilesize
72KB
-
memory/4904-8-0x000000001CC90000-0x000000001CCCE000-memory.dmpFilesize
248KB
-
memory/4904-9-0x00007FF97EED3000-0x00007FF97EED4000-memory.dmpFilesize
4KB
-
memory/4904-14-0x00007FF97EED0000-0x00007FF97F8BC000-memory.dmpFilesize
9.9MB