Analysis

  • max time kernel
    129s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 11:31

General

  • Target

    Otago_IB_Conf.lnk

  • Size

    1KB

  • MD5

    4af014550fcfd0cb5a60d18d3e339654

  • SHA1

    f7cd52bf3c622c2784dcb7dbb0e39d9bbbcb2fef

  • SHA256

    43be8f7868bd8a976ca55757b5253b577012e02e75798225d76cf1111b401668

  • SHA512

    3690164c4cb64328f73c15ccc5c43b5fed0196ca27f62af40cef608d29e619d1272fb0a31b58de13dde7d67be65f4b2166a55d3dc6e78ccf10665ff175d8e97a

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

94.156.69.32:4782

Mutex

50380dde-34ad-4717-969f-5435a90bc9c0

Attributes
  • encryption_key

    34E5AD2D21D24289CCD1651CD4CE56F37B65DB13

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Otago_IB_Conf.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c start "" "Otago_IB.lnk" && start "" "Otago_IB_Conference.pptx"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Local\Temp\NordUpdateService.exe
        "C:\Users\Admin\AppData\Local\Temp\NordUpdateService.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Windows\SYSTEM32\RuntimeBroker.exe
          RuntimeBroker.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2964
      • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Otago_IB_Conference.pptx" /ou ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4200
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3980,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4856 /prefetch:8
    1⤵
      PID:980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1708-59-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-51-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-52-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-53-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-63-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-61-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-60-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-58-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-57-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/1708-62-0x000000006E900000-0x000000006E9E1000-memory.dmp

      Filesize

      900KB

    • memory/2964-67-0x0000024E3A2C0000-0x0000024E3A372000-memory.dmp

      Filesize

      712KB

    • memory/2964-64-0x0000024E1DD90000-0x0000024E1E0B6000-memory.dmp

      Filesize

      3.1MB

    • memory/2964-66-0x0000024E38FA0000-0x0000024E38FF0000-memory.dmp

      Filesize

      320KB

    • memory/2964-65-0x0000024E38C00000-0x0000024E38F24000-memory.dmp

      Filesize

      3.1MB

    • memory/2964-56-0x0000024E1E410000-0x0000024E1E411000-memory.dmp

      Filesize

      4KB

    • memory/2964-55-0x0000024E1E400000-0x0000024E1E401000-memory.dmp

      Filesize

      4KB

    • memory/4200-48-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-49-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-3-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-10-0x00007FF8656B0000-0x00007FF8656C0000-memory.dmp

      Filesize

      64KB

    • memory/4200-7-0x00007FF8656B0000-0x00007FF8656C0000-memory.dmp

      Filesize

      64KB

    • memory/4200-47-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-5-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-50-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-2-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-4-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB

    • memory/4200-6-0x00007FF8678D0000-0x00007FF8678E0000-memory.dmp

      Filesize

      64KB