Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 06:22
Behavioral task
behavioral1
Sample
dwdwdw.exe
Resource
win7-20240708-en
General
-
Target
dwdwdw.exe
-
Size
3.1MB
-
MD5
2918c8a614e88697a74fa44db27518f0
-
SHA1
e7f6f4cf9e8cb900e71633b628b3a3b54e90a179
-
SHA256
ace4ac0da20b7e8b91205196f973a80e117bc4cede40ea445e851382567456a4
-
SHA512
f452b243d7ed593e4d22481e02431773687f1c61783ecebf70bb8e80ce17332b9f1c1a4cb21760770dcbb0adef22ab6c4196089b50a2565ba2da4d962b22b8e3
-
SSDEEP
49152:VHobtR1o2PmNXo7WCr5lkcXcIYXrYdyQTHHB72eh2NT:VHmRvmNXo7WCr5lkcXcI6/
Malware Config
Extracted
quasar
1.4.1
Office04
147.185.221.18:42996
147.185.221.18:1770
c2e1b18a-ce93-436d-ad8b-21bf89015e19
-
encryption_key
9E968F05BD874BA1BE086FD1774A027473823F49
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2136-1-0x0000000001120000-0x0000000001444000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dwdwdw.exedescription pid process Token: SeDebugPrivilege 2136 dwdwdw.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
dwdwdw.exepid process 2136 dwdwdw.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
dwdwdw.exepid process 2136 dwdwdw.exe