Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
31-07-2024 17:26
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240705-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
8b390eb4d2dc32a82c6b8047504fa532
-
SHA1
5c6d6b99771b1301002a2a89e8567c8e5d8149d4
-
SHA256
aeeedbe5a56241a34a9761b5517a8648cadee5d583b2fe77d7beb1f030b0c9c3
-
SHA512
3586923bedc527240bcb6b23d5a55bd55922dc4a2d3a6f7b68bda00d34abb3d473c34ef161199e2515bb8e82536ffc666b91f35f96101395ab6620b20ab13a27
-
SSDEEP
49152:pHobtR1o2PmNXo7WCr5sN4Rw8IgXrYdSBewTHHB72eh2NT:pHmRvmNXo7WCr5lw8tVB
Malware Config
Extracted
quasar
1.4.1
Office04
147.185.221.20:18563
147.185.221.20:9835
c2e1b18a-ce93-436d-ad8b-21bf89015e19
-
encryption_key
9E968F05BD874BA1BE086FD1774A027473823F49
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2440-1-0x00000000012D0000-0x00000000015F4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 2440 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Client-built.exepid process 2440 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Client-built.exepid process 2440 Client-built.exe