Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 04:34
Behavioral task
behavioral1
Sample
server.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20240226-en
General
-
Target
server.exe
-
Size
3.1MB
-
MD5
07dccd8779b74ad4a54626bcd2cb3bef
-
SHA1
f433850738d4a26367da7596b73003200053362c
-
SHA256
5800caf82a36637733bfcbf94ff7d84a94b9aed9219e379f8a7fd0fdb9ba2f65
-
SHA512
4c9c9c9801f62fc8ad811e0e0f46eed808fb2085470f6ba82e1d8319f27459731ef8a77db8cc4be389c452816156bcdcf1a0e0e709b5559b0a072601e9f65cbc
-
SSDEEP
49152:3vGlL26AaNeWgPhlmVqvMQ7XSKZoRJ64bR3LoGdZtTHHB72eh2NT:3vGL26AaNeWgPhlmVqkQ7XSKZoRJ6SJ
Malware Config
Extracted
quasar
1.4.1
@123
mother-amanda.gl.at.ply.gg:21734
9e934c1b-08a6-4685-bb6a-de27a875f421
-
encryption_key
8E8D64935A72F87FC7C5AD95C61A6C59BC55CDA1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral3/memory/4288-1-0x00000000009D0000-0x0000000000CF4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 7 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2608 PING.EXE 852 PING.EXE 224 PING.EXE 3592 PING.EXE 1136 PING.EXE 2228 PING.EXE 3652 PING.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
server.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exedescription pid process Token: SeDebugPrivilege 4288 server.exe Token: SeDebugPrivilege 3492 server.exe Token: SeDebugPrivilege 1620 server.exe Token: SeDebugPrivilege 4236 server.exe Token: SeDebugPrivilege 4656 server.exe Token: SeDebugPrivilege 1944 server.exe Token: SeDebugPrivilege 3180 server.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
server.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exepid process 4288 server.exe 3492 server.exe 1620 server.exe 4236 server.exe 4656 server.exe 1944 server.exe 3180 server.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
server.execmd.exeserver.execmd.exeserver.execmd.exeserver.execmd.exeserver.execmd.exeserver.execmd.exeserver.execmd.exedescription pid process target process PID 4288 wrote to memory of 1196 4288 server.exe cmd.exe PID 4288 wrote to memory of 1196 4288 server.exe cmd.exe PID 1196 wrote to memory of 1528 1196 cmd.exe chcp.com PID 1196 wrote to memory of 1528 1196 cmd.exe chcp.com PID 1196 wrote to memory of 224 1196 cmd.exe PING.EXE PID 1196 wrote to memory of 224 1196 cmd.exe PING.EXE PID 1196 wrote to memory of 3492 1196 cmd.exe server.exe PID 1196 wrote to memory of 3492 1196 cmd.exe server.exe PID 3492 wrote to memory of 2904 3492 server.exe cmd.exe PID 3492 wrote to memory of 2904 3492 server.exe cmd.exe PID 2904 wrote to memory of 2356 2904 cmd.exe chcp.com PID 2904 wrote to memory of 2356 2904 cmd.exe chcp.com PID 2904 wrote to memory of 3592 2904 cmd.exe PING.EXE PID 2904 wrote to memory of 3592 2904 cmd.exe PING.EXE PID 2904 wrote to memory of 1620 2904 cmd.exe server.exe PID 2904 wrote to memory of 1620 2904 cmd.exe server.exe PID 1620 wrote to memory of 2784 1620 server.exe cmd.exe PID 1620 wrote to memory of 2784 1620 server.exe cmd.exe PID 2784 wrote to memory of 2640 2784 cmd.exe chcp.com PID 2784 wrote to memory of 2640 2784 cmd.exe chcp.com PID 2784 wrote to memory of 1136 2784 cmd.exe PING.EXE PID 2784 wrote to memory of 1136 2784 cmd.exe PING.EXE PID 2784 wrote to memory of 4236 2784 cmd.exe server.exe PID 2784 wrote to memory of 4236 2784 cmd.exe server.exe PID 4236 wrote to memory of 1092 4236 server.exe cmd.exe PID 4236 wrote to memory of 1092 4236 server.exe cmd.exe PID 1092 wrote to memory of 4896 1092 cmd.exe chcp.com PID 1092 wrote to memory of 4896 1092 cmd.exe chcp.com PID 1092 wrote to memory of 2228 1092 cmd.exe PING.EXE PID 1092 wrote to memory of 2228 1092 cmd.exe PING.EXE PID 1092 wrote to memory of 4656 1092 cmd.exe server.exe PID 1092 wrote to memory of 4656 1092 cmd.exe server.exe PID 4656 wrote to memory of 2180 4656 server.exe cmd.exe PID 4656 wrote to memory of 2180 4656 server.exe cmd.exe PID 2180 wrote to memory of 3176 2180 cmd.exe chcp.com PID 2180 wrote to memory of 3176 2180 cmd.exe chcp.com PID 2180 wrote to memory of 3652 2180 cmd.exe PING.EXE PID 2180 wrote to memory of 3652 2180 cmd.exe PING.EXE PID 2180 wrote to memory of 1944 2180 cmd.exe server.exe PID 2180 wrote to memory of 1944 2180 cmd.exe server.exe PID 1944 wrote to memory of 1824 1944 server.exe cmd.exe PID 1944 wrote to memory of 1824 1944 server.exe cmd.exe PID 1824 wrote to memory of 1444 1824 cmd.exe chcp.com PID 1824 wrote to memory of 1444 1824 cmd.exe chcp.com PID 1824 wrote to memory of 2608 1824 cmd.exe PING.EXE PID 1824 wrote to memory of 2608 1824 cmd.exe PING.EXE PID 1824 wrote to memory of 3180 1824 cmd.exe server.exe PID 1824 wrote to memory of 3180 1824 cmd.exe server.exe PID 3180 wrote to memory of 720 3180 server.exe cmd.exe PID 3180 wrote to memory of 720 3180 server.exe cmd.exe PID 720 wrote to memory of 4072 720 cmd.exe chcp.com PID 720 wrote to memory of 4072 720 cmd.exe chcp.com PID 720 wrote to memory of 852 720 cmd.exe PING.EXE PID 720 wrote to memory of 852 720 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wrr28RXegIfd.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650013⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CIGLmipQcGa1.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650015⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sB94YRkaCAzb.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650017⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JjitCF1wQiDF.bat" "8⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650019⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Cwhqui4oFn7x.bat" "10⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500111⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4FnDPfQMKWaF.bat" "12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500113⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iK8BlHZM1Xcf.bat" "14⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 6500115⤵
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\server.exe.logFilesize
2KB
MD515eab799098760706ed95d314e75449d
SHA1273fb07e40148d5c267ca53f958c5075d24c4444
SHA25645030bd997f50bb52c481f7bc86fac5f375d08911bcc106b98d9d8f0c2ce9778
SHA51250c125e2a98740db0a0122d7f4de97c50d84623e800b3d3e173049c8e28ff0fbe4add7677bc56cb2228f78ed17522f67ae8f1b85f62824012414ce38ce0b500c
-
C:\Users\Admin\AppData\Local\Temp\4FnDPfQMKWaF.batFilesize
203B
MD58ffe60ca6e140394cb71a44b54253fd2
SHA13a80e45ac587c3cf5ffd74cd054269efb28e5d19
SHA25645ad178eaaf2559ba936569af4b7ba94e1958f925cb4ee5ae2a733aad06762f3
SHA512e399af016aaa63a85cedd2e1391abb95365f76dd03f745f2222178d6e36e3c56d3766698ba5db663d9420e05da8d03fb405613942cfdd9a3e608119320f1390a
-
C:\Users\Admin\AppData\Local\Temp\CIGLmipQcGa1.batFilesize
203B
MD568709e6889e362ff7b6ff5bf13f8546f
SHA19b1ef1b8203a46fcac2fcf94110d6fe2535dd9bf
SHA256417f0f640ad1a7056ad76cee43bb4ef4a4dc845d1d12d6493a7da48d4534411d
SHA5127e21d5acd4ab43d14c15c4c590398c7b278fd6c4008671cc862083f107199a494f9b3b09e83e722c3c55ea9c354ed13869dcd7d31f8c17d589e7c4adc57f1911
-
C:\Users\Admin\AppData\Local\Temp\Cwhqui4oFn7x.batFilesize
203B
MD5c79dcce7481e05aa16cbb68c290a746c
SHA1e287648be036630f7de8a81af56b5a128a21767e
SHA256ebd87722da3dceb5f4bf36fd175517ddb86dcb40e06deb1dfd7256049f36efe3
SHA51226668ad055cac1a5ff889fb3c226395dedcc084abfffe6c375d892ef25a3505904a54f3a45087e5ac7e941d4d86ffc19f9938d5911a7cbe99283ddb294870475
-
C:\Users\Admin\AppData\Local\Temp\JjitCF1wQiDF.batFilesize
203B
MD5065ab646749059e3f55d0fc28cf35eba
SHA1a5e9db99cf1a1ef0e0fbff348e8cd000fe6c91c0
SHA256bd0f0fac8f51da26dcf2fb923945099927fe88580bf43445bffeb335ca6f678f
SHA51224408fa648a523f2cebbb14615653e93482697f1c5dda1b8b351e7dbca7b658a27417080c483a0866541818c9c11396ede7e96362de53941332e14eeda5d362a
-
C:\Users\Admin\AppData\Local\Temp\Wrr28RXegIfd.batFilesize
203B
MD5aae5f3e695612b5d2515194682550ed4
SHA12206ed2000b634463905ef7f7c09f137b0e9f229
SHA256921f045f29434210baa178b8a24944a5c13e4a3b097f35974f8ef439aa82cf99
SHA512941bb03f7afb735d653ef014ef1e8c433ca211c6979c64b6056a6c0b0a4d4c66f45e945d65cfcc4f89497bdeb5027f67914e06506460dd0883224943afe5fbad
-
C:\Users\Admin\AppData\Local\Temp\iK8BlHZM1Xcf.batFilesize
203B
MD5210c528b63b93b706d2d94d75cbfea3c
SHA17076bf0a835034c5fc744956d6ff1e06e1d6e033
SHA2560f6ea0caf7e8bf15cf049dec4163b8785b20b061c6e2f67b03e6b38eb63dfdbb
SHA5122142ed898083cec410bf673506c5d85018eb657b91a47b94b0cf3f8699f9b321958189e302b369804fa2b46a2d8a151b7f6c592cffdb5dc380d305f46505364c
-
C:\Users\Admin\AppData\Local\Temp\sB94YRkaCAzb.batFilesize
203B
MD5f7c8974ce1b8e7e0097a74e08c134b0e
SHA1be678ab8a05cc65fea14a6e8dc60d62737cdc78d
SHA2568db1ceb78c30cb6301a14405e37480cfde364aeb59555fa878930b1e8d66a359
SHA512a220f0807610e6734af2dc5ab1df183d0d70a088bb4d6c246d5af2020e60c8c161f20c412ed69c0fdd77473db76d5227e2286846923a147d52b060cc6cc7d4a5
-
memory/3492-12-0x00007FFB0A170000-0x00007FFB0AC32000-memory.dmpFilesize
10.8MB
-
memory/3492-16-0x00007FFB0A170000-0x00007FFB0AC32000-memory.dmpFilesize
10.8MB
-
memory/4288-0-0x00007FFB0A173000-0x00007FFB0A175000-memory.dmpFilesize
8KB
-
memory/4288-9-0x00007FFB0A170000-0x00007FFB0AC32000-memory.dmpFilesize
10.8MB
-
memory/4288-4-0x000000001BF20000-0x000000001BFD2000-memory.dmpFilesize
712KB
-
memory/4288-3-0x000000001BE10000-0x000000001BE60000-memory.dmpFilesize
320KB
-
memory/4288-2-0x00007FFB0A170000-0x00007FFB0AC32000-memory.dmpFilesize
10.8MB
-
memory/4288-1-0x00000000009D0000-0x0000000000CF4000-memory.dmpFilesize
3.1MB