Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 10:22
Behavioral task
behavioral1
Sample
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
Resource
win10v2004-20240802-en
General
-
Target
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
-
Size
3.1MB
-
MD5
17807d0af1370c52ea1a1e8b6cf5edc8
-
SHA1
a7e7526f275b05940f4f2c4fe88ac6fd053e31eb
-
SHA256
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142
-
SHA512
8fec9d74a728990b06983d0815fe0b17c349e693442f545134d65f89c6dbd1fddca7e25982315dea42b0190f39e3aa5145793d6b98e4ded5d4a7779d9fcbb22f
-
SSDEEP
49152:0HobtR1o2PmNXo7WCr5C5OWnXrYXxHTHHB72eh2NT:0HmRvmNXo7WCr5C5O0
Malware Config
Extracted
quasar
1.4.1
GensisLoader
147.185.221.18:42996
147.185.221.18:1770
c2e1b18a-ce93-436d-ad8b-21bf89015e19
-
encryption_key
9E968F05BD874BA1BE086FD1774A027473823F49
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2140-1-0x0000000000CA0000-0x0000000000FC4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2140 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe"C:\Users\Admin\AppData\Local\Temp\4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2140