Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/07/2024, 23:42
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240709-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
3040ddbbf3cbc49eba2353b3d06e8701
-
SHA1
56b17d99351d437ea96c18b3deda550fb552f293
-
SHA256
fffa2fd8bb1c31336565a074feea209eba261046cad6f909bc1adca8dc16e773
-
SHA512
830d5882417b64e02da6addbc2859f181eabf75bbedda59b769694c52be8e06d32cff47fa22cea910eb1828c2980a8731f9a54d71d3ab64f2c878d2a675740ba
-
SSDEEP
49152:mvbI22SsaNYfdPBldt698dBcjHB2E1JcHoGdUTHHB72eh2NT:mvk22SsaNYfdPBldt6+dBcjHB21
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.6:7771
dcc402d9-5194-46ec-9807-16efa288ad31
-
encryption_key
A5152C76A0A41EC0E2F377162894926FF97AACE3
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral3/memory/648-1-0x0000000000DF0000-0x0000000001114000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 648 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 648 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 648 Client-built.exe