Resubmissions
14/10/2024, 20:23
241014-y6cbhsydjn 1014/10/2024, 20:20
241014-y4k6msyclj 1014/10/2024, 20:16
241014-y184asyarp 1014/10/2024, 20:08
241014-ywzztsxgpp 10Analysis
-
max time kernel
139s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 20:20
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
58b8b37869465016462b7b14b86d2bb8
-
SHA1
b5d31e9f8691153b7716c8b5e40211556a7c5710
-
SHA256
cf1f9aa93af680a196f52f46de82e37adf6bc7be50018d3ca3b38d6ff16df2d4
-
SHA512
9dc86b3c7a924f86108a0e013ce5859cbc9c60fc61e601378d5f4bca8d593919ccabca336b14205fd696e7b7801eff1f330a342684e488fbf43a951f8ee06b56
-
SSDEEP
49152:AvcI22SsaNYfdPBldt698dBcjHVGR16dbR3toGd3THHB72eh2NT:AvR22SsaNYfdPBldt6+dBcjHVGR16J
Malware Config
Extracted
quasar
1.4.1
Traige
Alessandrolol66-30592.portmap.host:30592
45bdc82f-bdfb-446e-af9c-d0a46e53752d
-
encryption_key
B11D992865826F9FDFE1488DBCF3B1031C9ED9CB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows.Sys
-
subdirectory
SubDir
Signatures
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/2260-1-0x00000000003B0000-0x00000000006D4000-memory.dmp family_quasar behavioral2/files/0x000a000000023b80-7.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1360 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2260 Client-built.exe Token: SeDebugPrivilege 1360 Client.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1360 2260 Client-built.exe 87 PID 2260 wrote to memory of 1360 2260 Client-built.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD558b8b37869465016462b7b14b86d2bb8
SHA1b5d31e9f8691153b7716c8b5e40211556a7c5710
SHA256cf1f9aa93af680a196f52f46de82e37adf6bc7be50018d3ca3b38d6ff16df2d4
SHA5129dc86b3c7a924f86108a0e013ce5859cbc9c60fc61e601378d5f4bca8d593919ccabca336b14205fd696e7b7801eff1f330a342684e488fbf43a951f8ee06b56