Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 10:22
Behavioral task
behavioral1
Sample
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
Resource
win10v2004-20240802-en
General
-
Target
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
-
Size
3.1MB
-
MD5
17807d0af1370c52ea1a1e8b6cf5edc8
-
SHA1
a7e7526f275b05940f4f2c4fe88ac6fd053e31eb
-
SHA256
4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142
-
SHA512
8fec9d74a728990b06983d0815fe0b17c349e693442f545134d65f89c6dbd1fddca7e25982315dea42b0190f39e3aa5145793d6b98e4ded5d4a7779d9fcbb22f
-
SSDEEP
49152:0HobtR1o2PmNXo7WCr5C5OWnXrYXxHTHHB72eh2NT:0HmRvmNXo7WCr5C5O0
Malware Config
Extracted
quasar
1.4.1
GensisLoader
147.185.221.18:42996
147.185.221.18:1770
c2e1b18a-ce93-436d-ad8b-21bf89015e19
-
encryption_key
9E968F05BD874BA1BE086FD1774A027473823F49
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4284-1-0x0000000000FB0000-0x00000000012D4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4284 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4284 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe 4284 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4284 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe 4284 4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe"C:\Users\Admin\AppData\Local\Temp\4c9aff4146e3fb6e795d2f7cbddea6a8912e14e3c1c5ad384582b80b1c510142.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4328,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:3172