Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 04:51
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
stub.exe
-
Size
53.7MB
-
MD5
9cd2d4b7e25115e134918d2047775d2b
-
SHA1
9e95df3a5c42feadeb4892ac411053035b0f36f6
-
SHA256
eee70db6c16fcfe19c9f9811344699dcb91921d4584c28e78963aba4214050f4
-
SHA512
5007f3932c10001395db178ed6fafbf89cea97ec8238327533e63f286262dd25fe2876a06cc2205c6033d5019a26fd60b70ada1eddc2bbcea954c010bc65d890
-
SSDEEP
1572864:d5q2Edpp1DAdFV+rkBg7DcO3ZOzsUsVHiphQMl+9MlxE0mhxAd:7gppGgP1IzsfVyQA+E3
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
147.185.221.20:9835
147.185.221.20:18563
Mutex
da84adab-a321-4164-9473-73ad56cb4ed3
Attributes
-
encryption_key
99DD896C463A5DEFC60E5185D43A6893ACB75CFB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/1232-1-0x00000000004F0000-0x0000000003AB4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1232 stub.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 stub.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1232 stub.exe