Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-07-2024 16:54
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240704-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
33794c237d2b1071e355cee7718a5864
-
SHA1
39fedb8d39548676a94a63f66df838338f9952d4
-
SHA256
63a6116026ded4e6c7061bbebb6ca2c1b58fdad9c65925328d4250eb3d061eaf
-
SHA512
281b834986953e32bc5bcc93c0e9cdd2b9aba31ef1e5ef2c1cd6bdac3fd46bbbc9db2c83dc8471a26a88d77a3abe9b429861be0595a9100f01d0d7cabec70b00
-
SSDEEP
49152:NHobtR1o2PmNXo7WCr5f/K0mvhhXrYdzkTHHB72eh2NT:NHmRvmNXo7WCr5f/K0mZR8
Malware Config
Extracted
quasar
1.4.1
Office04
147.185.221.20:18563
147.185.221.20:9835
c2e1b18a-ce93-436d-ad8b-21bf89015e19
-
encryption_key
9E968F05BD874BA1BE086FD1774A027473823F49
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3032-1-0x00000000009E0000-0x0000000000D04000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 3032 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Client-built.exepid process 3032 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Client-built.exepid process 3032 Client-built.exe