Analysis

  • max time kernel
    146s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 11:23

General

  • Target

    e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe

  • Size

    491KB

  • MD5

    fcc248bdb9b56bdd926a13bbff61fadd

  • SHA1

    45bf684e6add3acf6fd8b3e8f6e923195f7994d7

  • SHA256

    e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f

  • SHA512

    b02fdae03adbee721d853053a95bea188b5453f0d270c71fe9a613bbb40f0c9d4e4e57a8d8eab117316ada9cde45223171f89c2e05a8a4fe7254b884ad3e731c

  • SSDEEP

    12288:kK0rI0JwBzjDtVqGcrX4vLH2mTMGG5D8ajXBnGBF5XlXJZSo:f0XGvDtVqGkX4vz/ID8ajXByXlXJZ

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Moasa

C2

neji.w0rld.ga:7777

Mutex

DerPeeekshsaPjTQXfNVygAvPX

Attributes
  • encryption_key

    3xF1E8vK84C8qCe7p0kkroBeQvMxMIry

  • install_name

    Client.exe

  • log_directory

    Harsh

  • reconnect_delay

    2000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
    "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hMb7KAY0Z2r1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3192
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2332
        • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
          "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4756
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GalyOkcgiw2y.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:1844
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2012
              • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
                "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
                5⤵
                • Checks computer location settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2132
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6qAVPF81AfVt.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1104
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:3564
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      7⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:5068
                    • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
                      "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
                      7⤵
                      • Checks computer location settings
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:3232
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TvU6Q2FcYwF5.bat" "
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:668
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          9⤵
                            PID:4564
                          • C:\Windows\system32\PING.EXE
                            ping -n 10 localhost
                            9⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:3432
                          • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
                            "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
                            9⤵
                            • Checks computer location settings
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:4952
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\g0xfOhU1bm0o.bat" "
                              10⤵
                              • Suspicious use of WriteProcessMemory
                              PID:1496
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                11⤵
                                  PID:4032
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  11⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:1864
                                • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
                                  "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
                                  11⤵
                                  • Checks computer location settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:4248
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eLOEYCo3aGU3.bat" "
                                    12⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4344
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      13⤵
                                        PID:1372
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        13⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:3524
                                      • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
                                        "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
                                        13⤵
                                        • Checks computer location settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:3204
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gXq4WLzPvHM7.bat" "
                                          14⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:1568
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            15⤵
                                              PID:1976
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              15⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:2960
                                            • C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe
                                              "C:\Users\Admin\AppData\Local\Temp\e7b175e7b4e579fe314e56c1a195a937c0e7780fbc0f3def13b7dae08560000f.exe"
                                              15⤵
                                                PID:1188

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\6qAVPF81AfVt.bat

                    Filesize

                    261B

                    MD5

                    3d45bfe735e94af5beb975eeee6eca22

                    SHA1

                    01ef6ab0659d24c80af7e04affdf1bc839cbc291

                    SHA256

                    1b948d80bd45ad56544e7ea740ec86dd28bf011432319520605f0a4e66964a9b

                    SHA512

                    2dcbed243474da8ee6f7d1096060fd12e3cb4a93610f55a51c8b0f38cc45b36427e7e23f7721693a9400dc1f95009100a502f9424411351f1a18a6957c74442a

                  • C:\Users\Admin\AppData\Local\Temp\GalyOkcgiw2y.bat

                    Filesize

                    261B

                    MD5

                    f78fc685d0dca9e89f8e1ca3fa98ddb4

                    SHA1

                    61259a28848f832143f89d83aa501e361ac7669b

                    SHA256

                    428611872d2b77132b46367894e33646b3aa201365e37ccb27e3b3961e686b7c

                    SHA512

                    a12a2aa5c7ebafba507e34620f181ffcf1915679e51235c11c30f179b72ddebec4d97e4dc1e6011a89214020f6b45691340d144f84918bc6b6c15d843a570ecb

                  • C:\Users\Admin\AppData\Local\Temp\TvU6Q2FcYwF5.bat

                    Filesize

                    261B

                    MD5

                    52d62a9a7350a72b00ba86136455cdec

                    SHA1

                    05f3cfdb9356a2be14eff4a550fff562d4cfb0bb

                    SHA256

                    d616681f2d75126c890e877debd827c4e8775ec6fa1797bb043a303a2a034b72

                    SHA512

                    7edf5693005ae31a5747f1f6c6b42b582cfaba4422374228ed421d80d2263a08606c6bed94cbb162ee5d8867d26c3715637baaf2678029d8bc41fcc9bf74c690

                  • C:\Users\Admin\AppData\Local\Temp\eLOEYCo3aGU3.bat

                    Filesize

                    261B

                    MD5

                    33cfb3dc294ccf2f219658a3a000fd20

                    SHA1

                    6e4fc9867c7e691fb1f2c6073ee0a720f8a430f9

                    SHA256

                    3ab1e8cc8d0e83755bb7c60c4ffbd54fda684653188b365a6c3745b1727d7b1a

                    SHA512

                    a4267e116ea79a452dba6ea2c88bd30da358deccedd5c8afa9f3f1328df3ddd927ac5f58588db59457a259a37a8647ab818fa88bc1f9b45c30cef02f6055c28c

                  • C:\Users\Admin\AppData\Local\Temp\g0xfOhU1bm0o.bat

                    Filesize

                    261B

                    MD5

                    e4266abf3d833047245691d40f7bd1b2

                    SHA1

                    e8322fc81713ab7b42be5c582fe1c9b252bf0d82

                    SHA256

                    a021202a57192aa8df77bea06d354b439731119aed31bbc71d1c2c5461aa2ecc

                    SHA512

                    05a4c51336ea51d586a7146c4673663516c3c431607e744acf502892f581c09672a275636f3388dbba25b26b5be704cfe00ed25a138f7f5aa6253a429f5bafcb

                  • C:\Users\Admin\AppData\Local\Temp\gXq4WLzPvHM7.bat

                    Filesize

                    261B

                    MD5

                    2d812902683ace75696af6a0ab66e371

                    SHA1

                    ae287eb0c4cb2993ce3f199bb6df8c1a9f663be3

                    SHA256

                    2cfdccfb22036fd18e3f6fdd83a1e1868b3cf6e44833ed44ec09d021aca99b66

                    SHA512

                    c53b8eb7ea9c17f9336d40e88dc98d152c45abad83e66ed68432affc38d878d54500bbffc2d8df4130a921a8334207026efabdaec39ee531ec1ed22809c5f3e1

                  • C:\Users\Admin\AppData\Local\Temp\hMb7KAY0Z2r1.bat

                    Filesize

                    261B

                    MD5

                    95af46a9eb96d2051e3611130d696503

                    SHA1

                    8fe333b00b11063b67110be501e870c619c03266

                    SHA256

                    bf9e12be8f8e175e89fb28e70cf2fc8ee380cffe98016407d90dfb10aadbb5a2

                    SHA512

                    a33a976d739220154ee0a8ccbdb1285f42c1b3a3a2d75457393d4a90b85eb7bebc16e01c8d37c4762310a5c6ea13a8d51deb59b05e5b489b4f22ddd83a2ba303

                  • C:\Users\Admin\AppData\Roaming\Harsh\08-21-2024

                    Filesize

                    224B

                    MD5

                    b0ccdf8b608e9a91e34d77b0981d8e0f

                    SHA1

                    4d31f20569b119a8aec02b4b65bff746c3fca0b8

                    SHA256

                    9f4e43be1e8f1f47a4b2e91e5f92518d64f52e9d0058dfebcc9f2c8f31680291

                    SHA512

                    92af85146a6a8b256741e787be344b2eaab12d717c9ca9e05e67a689416079db5ea9371f71105f47496c5a6266ea9e76dd64fba1470fb22284d310f09c36df8b

                  • C:\Users\Admin\AppData\Roaming\Harsh\08-21-2024

                    Filesize

                    224B

                    MD5

                    f8765f4ead4d90efb9cf5d7ec8b3d450

                    SHA1

                    748c204110f91ca9168d459b2a9b8d52c9fed0ab

                    SHA256

                    e118be49752405671f6ccb5bb94ed3dae2b72cea7775383babd21fbb6f0566fa

                    SHA512

                    1d9ae56bccd849ae35c6fbeaaf6e5a0a5e50ac9a1eea8a53b93f8020673ca8db3f8cebe086018d09de15123bc9608b87c9c70c0d1d3b616da489eff878cf84c6

                  • C:\Users\Admin\AppData\Roaming\Harsh\08-21-2024

                    Filesize

                    224B

                    MD5

                    0f6161a9916b2e58b73c93f05e69287b

                    SHA1

                    d9e15ba212afb1a895501e170e728d8c7c733fc9

                    SHA256

                    5d275a442865705291296c565a72e4622f2284954d6986d2a14f3aa1a076013c

                    SHA512

                    85e252c92562bc8fb4aef7cf9cef480b248384624c81bfe402c4d8ff2f240f3d95c41d4d2a6c18034ecdd66c38ca35b4c263bf64b611d8440e3316c0e1e8650e

                  • C:\Users\Admin\AppData\Roaming\Harsh\08-21-2024

                    Filesize

                    224B

                    MD5

                    5dac81e492a54fa67a63fca2d563d168

                    SHA1

                    712c9480b8b9d73b80643ce8d9806240a8ee0cc4

                    SHA256

                    fb3c1e2b4f4001111d32e86f83a86da35f688ebddab7f91423a71664e41e1faf

                    SHA512

                    46da4aada25d58f0eb123f028ccc642d0b74d6ac9a4c1199ef8e75e27632ff07bc074f37a6547281fe6a2c0b0c3d68c1fc434b1a44b636e909702c3bd03b667b

                  • C:\Users\Admin\AppData\Roaming\Harsh\08-21-2024

                    Filesize

                    224B

                    MD5

                    b3beb3d7515c85c8bafb7d718c200aef

                    SHA1

                    9037801ac6705052949a60fb3aae7a23d7f252a5

                    SHA256

                    9d62cbd86c8fd205c9ed4af8c6ac478a16d3c558c1ed74af1bac4cdcdea0c963

                    SHA512

                    1aa0885abf0b2f45cf2681f036df727cc101545b9b3523e36a1e4cc75ab6018b3b521dbda9b3e03d3e7721cb96eaaaad8faefd8fb93b4eff747196dff3d0544a

                  • memory/4408-6-0x00007FFC51220000-0x00007FFC51CE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4408-8-0x000000001C200000-0x000000001C23C000-memory.dmp

                    Filesize

                    240KB

                  • memory/4408-1-0x0000000000170000-0x00000000001F2000-memory.dmp

                    Filesize

                    520KB

                  • memory/4408-16-0x00007FFC51220000-0x00007FFC51CE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4408-10-0x000000001C7A0000-0x000000001C852000-memory.dmp

                    Filesize

                    712KB

                  • memory/4408-2-0x00000000022F0000-0x000000000234E000-memory.dmp

                    Filesize

                    376KB

                  • memory/4408-9-0x000000001C690000-0x000000001C6E0000-memory.dmp

                    Filesize

                    320KB

                  • memory/4408-3-0x00007FFC51220000-0x00007FFC51CE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4408-7-0x0000000002350000-0x0000000002362000-memory.dmp

                    Filesize

                    72KB

                  • memory/4408-0-0x00007FFC51223000-0x00007FFC51225000-memory.dmp

                    Filesize

                    8KB

                  • memory/4408-5-0x0000000002390000-0x000000000241C000-memory.dmp

                    Filesize

                    560KB

                  • memory/4408-4-0x00007FFC51223000-0x00007FFC51225000-memory.dmp

                    Filesize

                    8KB

                  • memory/4756-17-0x00007FFC51220000-0x00007FFC51CE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4756-25-0x00007FFC51220000-0x00007FFC51CE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4756-18-0x00007FFC51220000-0x00007FFC51CE1000-memory.dmp

                    Filesize

                    10.8MB