Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 18:49
Behavioral task
behavioral1
Sample
QuasarSetup.jar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
QuasarSetup.jar
Resource
win10v2004-20240802-en
General
-
Target
QuasarSetup.jar
-
Size
2.5MB
-
MD5
a9c67848d7724678aca0a07d9e8240c8
-
SHA1
47ef05187c8d03e972cf2fa96b5f0fe56e0126af
-
SHA256
f7f3898f438251a9f5b3f673eeea7cbbf67e038d1a569226167613cd98a2cfb6
-
SHA512
6300902ecb5c10c1410e8f24620c073a3ceb25588c59f6512c643945d7b59512e31cf82737941f5d2d6a8763a9647238a1db02ef1186be702f886352a4dde539
-
SSDEEP
49152:VoQkUvyHs+ouau7nZAnkhHB/v2Q+Iu38KgzwgUrVVfsjrtWjl8QKHAnF:Vpk/s+20nZAnknvSMvsx3fsvtWD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1725648551309.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1004 java.exe 1004 java.exe 1004 java.exe 1004 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1004 wrote to memory of 3312 1004 java.exe 89 PID 1004 wrote to memory of 3312 1004 java.exe 89 PID 1004 wrote to memory of 3612 1004 java.exe 91 PID 1004 wrote to memory of 3612 1004 java.exe 91 PID 3612 wrote to memory of 4748 3612 cmd.exe 93 PID 3612 wrote to memory of 4748 3612 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3312 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\QuasarSetup.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1725648551309.tmp2⤵
- Views/modifies file attributes
PID:3312
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1725648551309.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1725648551309.tmp" /f3⤵
- Adds Run key to start application
PID:4748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5a9c67848d7724678aca0a07d9e8240c8
SHA147ef05187c8d03e972cf2fa96b5f0fe56e0126af
SHA256f7f3898f438251a9f5b3f673eeea7cbbf67e038d1a569226167613cd98a2cfb6
SHA5126300902ecb5c10c1410e8f24620c073a3ceb25588c59f6512c643945d7b59512e31cf82737941f5d2d6a8763a9647238a1db02ef1186be702f886352a4dde539