Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 20:47
General
-
Target
Celestial.exe
-
Size
3.1MB
-
MD5
12bdd4b4c107fc3ffec7f9b29d7d6a93
-
SHA1
04bb395848578e22cef0c90215463e4efe4965c3
-
SHA256
af454978c652f9acb95b7c2f45d41ee0ba7923d6e3b3f554af853ef9efff9440
-
SHA512
ff4a2c42ac1fed5421955a949cf28c9abb714484bb68259f160516d10a7a179cc6e6327ab2fc2f099ba51a98b25fa5f41ea2af4f3815159e1ce7f75a698b8251
-
SSDEEP
49152:nv6lL26AaNeWgPhlmVqvMQ7XSKZkxNESElk/iULoGdldTHHB72eh2NT:nviL26AaNeWgPhlmVqkQ7XSKGxsa
Malware Config
Extracted
quasar
1.4.1
Office04
147.185.221.19:33365
ba5220e2-c4e8-4381-aad8-a85115ef955e
-
encryption_key
67C139F3E9A16FF8132A3DCF42197B8BA3C38609
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Miicrosoft Securiity
-
subdirectory
Miicrosoft Securiity
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3344-1-0x0000000000AC0000-0x0000000000DE4000-memory.dmp family_quasar behavioral1/files/0x0007000000023548-5.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4764 Client.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Miicrosoft Securiity\Client.exe Celestial.exe File opened for modification C:\Program Files\Miicrosoft Securiity\Client.exe Celestial.exe File opened for modification C:\Program Files\Miicrosoft Securiity Celestial.exe File opened for modification C:\Program Files\Miicrosoft Securiity Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3428 schtasks.exe 2804 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3344 Celestial.exe Token: SeDebugPrivilege 4764 Client.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4764 Client.exe 4764 Client.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4764 Client.exe 4764 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4764 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3428 3344 Celestial.exe 84 PID 3344 wrote to memory of 3428 3344 Celestial.exe 84 PID 3344 wrote to memory of 4764 3344 Celestial.exe 86 PID 3344 wrote to memory of 4764 3344 Celestial.exe 86 PID 4764 wrote to memory of 2804 4764 Client.exe 89 PID 4764 wrote to memory of 2804 4764 Client.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Celestial.exe"C:\Users\Admin\AppData\Local\Temp\Celestial.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Miicrosoft Securiity" /sc ONLOGON /tr "C:\Program Files\Miicrosoft Securiity\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3428
-
-
C:\Program Files\Miicrosoft Securiity\Client.exe"C:\Program Files\Miicrosoft Securiity\Client.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Miicrosoft Securiity" /sc ONLOGON /tr "C:\Program Files\Miicrosoft Securiity\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD512bdd4b4c107fc3ffec7f9b29d7d6a93
SHA104bb395848578e22cef0c90215463e4efe4965c3
SHA256af454978c652f9acb95b7c2f45d41ee0ba7923d6e3b3f554af853ef9efff9440
SHA512ff4a2c42ac1fed5421955a949cf28c9abb714484bb68259f160516d10a7a179cc6e6327ab2fc2f099ba51a98b25fa5f41ea2af4f3815159e1ce7f75a698b8251