Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 04:34
Behavioral task
behavioral1
Sample
server.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20240226-en
General
-
Target
server.exe
-
Size
3.1MB
-
MD5
07dccd8779b74ad4a54626bcd2cb3bef
-
SHA1
f433850738d4a26367da7596b73003200053362c
-
SHA256
5800caf82a36637733bfcbf94ff7d84a94b9aed9219e379f8a7fd0fdb9ba2f65
-
SHA512
4c9c9c9801f62fc8ad811e0e0f46eed808fb2085470f6ba82e1d8319f27459731ef8a77db8cc4be389c452816156bcdcf1a0e0e709b5559b0a072601e9f65cbc
-
SSDEEP
49152:3vGlL26AaNeWgPhlmVqvMQ7XSKZoRJ64bR3LoGdZtTHHB72eh2NT:3vGL26AaNeWgPhlmVqkQ7XSKZoRJ6SJ
Malware Config
Extracted
quasar
1.4.1
@123
mother-amanda.gl.at.ply.gg:21734
9e934c1b-08a6-4685-bb6a-de27a875f421
-
encryption_key
8E8D64935A72F87FC7C5AD95C61A6C59BC55CDA1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2332-1-0x0000000000540000-0x0000000000864000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
server.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
server.exedescription pid process Token: SeDebugPrivilege 2332 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
server.exepid process 2332 server.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
server.execmd.exedescription pid process target process PID 2332 wrote to memory of 1304 2332 server.exe cmd.exe PID 2332 wrote to memory of 1304 2332 server.exe cmd.exe PID 1304 wrote to memory of 4540 1304 cmd.exe chcp.com PID 1304 wrote to memory of 4540 1304 cmd.exe chcp.com PID 1304 wrote to memory of 2892 1304 cmd.exe PING.EXE PID 1304 wrote to memory of 2892 1304 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r00dXrM9WAsA.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650013⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\r00dXrM9WAsA.batFilesize
207B
MD52dae0159d976dbe53d985e792aabf187
SHA175961d167da3e312ff1958a5424b944e6aebb8e0
SHA256728a0cf0154c9e1dc5b2675ae18ed9a7648db583f36de50b96e8d39071996eed
SHA512c5bf59e5d41dd8c61618e803bff0450941f120d2494f5d04c3d2ca7ffee3d7fe15087f0b0a06f8fe75aba230714e4667214bfa42abdd4e677cb396cdf2825e42
-
memory/2332-0-0x00007FFA36593000-0x00007FFA36595000-memory.dmpFilesize
8KB
-
memory/2332-1-0x0000000000540000-0x0000000000864000-memory.dmpFilesize
3.1MB
-
memory/2332-2-0x00007FFA36590000-0x00007FFA37051000-memory.dmpFilesize
10.8MB
-
memory/2332-3-0x0000000002C00000-0x0000000002C50000-memory.dmpFilesize
320KB
-
memory/2332-4-0x000000001BA90000-0x000000001BB42000-memory.dmpFilesize
712KB
-
memory/2332-7-0x000000001B590000-0x000000001B5A2000-memory.dmpFilesize
72KB
-
memory/2332-8-0x000000001BA10000-0x000000001BA4C000-memory.dmpFilesize
240KB
-
memory/2332-9-0x000000001C690000-0x000000001C792000-memory.dmpFilesize
1.0MB
-
memory/2332-15-0x000000001C690000-0x000000001C792000-memory.dmpFilesize
1.0MB
-
memory/2332-16-0x00007FFA36590000-0x00007FFA37051000-memory.dmpFilesize
10.8MB