Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 14:38
Behavioral task
behavioral1
Sample
ImageLoggerBuilder-cleaned.exe
Resource
win7-20240903-en
General
-
Target
ImageLoggerBuilder-cleaned.exe
-
Size
3.1MB
-
MD5
3a91d47281cad7625d76ca7263223ba3
-
SHA1
8e8f27dae003ce7f429410e5edbc501377c64704
-
SHA256
fb3f86bfd12de22eead1e3a41548ec71f08664f94de7b4466027175a76969b09
-
SHA512
8ea8eeb2ca3bebb6c8532e746eea33ecdaabd0da0741ed00aff1e98501f4c03baf2ed315955151d558e0a27987baa84b4f802cd9d035397119f9f14f60afb617
-
SSDEEP
49152:M31ad6HzUFIjIiFqALZdMmu361/iRphhxUhxGNTHHB72eh2NT:M31asHzUFIjIiFqALjMmu361/0Xx
Malware Config
Extracted
quasar
1.4.1
Office04
Aynamit-58285.portmap.io:58285
7d6c4039-1882-4ac3-8711-9edc060091eb
-
encryption_key
B414A2AEA68C8F212513170411C6C2ACB8A1A963
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1864-1-0x0000000000F70000-0x0000000001290000-memory.dmp family_quasar behavioral1/files/0x0008000000016fdf-6.dat family_quasar behavioral1/memory/2328-9-0x0000000000870000-0x0000000000B90000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2328 Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1868 schtasks.exe 1920 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1864 ImageLoggerBuilder-cleaned.exe Token: SeDebugPrivilege 2328 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2328 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1868 1864 ImageLoggerBuilder-cleaned.exe 30 PID 1864 wrote to memory of 1868 1864 ImageLoggerBuilder-cleaned.exe 30 PID 1864 wrote to memory of 1868 1864 ImageLoggerBuilder-cleaned.exe 30 PID 1864 wrote to memory of 2328 1864 ImageLoggerBuilder-cleaned.exe 32 PID 1864 wrote to memory of 2328 1864 ImageLoggerBuilder-cleaned.exe 32 PID 1864 wrote to memory of 2328 1864 ImageLoggerBuilder-cleaned.exe 32 PID 2328 wrote to memory of 1920 2328 Client.exe 33 PID 2328 wrote to memory of 1920 2328 Client.exe 33 PID 2328 wrote to memory of 1920 2328 Client.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ImageLoggerBuilder-cleaned.exe"C:\Users\Admin\AppData\Local\Temp\ImageLoggerBuilder-cleaned.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1868
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD53a91d47281cad7625d76ca7263223ba3
SHA18e8f27dae003ce7f429410e5edbc501377c64704
SHA256fb3f86bfd12de22eead1e3a41548ec71f08664f94de7b4466027175a76969b09
SHA5128ea8eeb2ca3bebb6c8532e746eea33ecdaabd0da0741ed00aff1e98501f4c03baf2ed315955151d558e0a27987baa84b4f802cd9d035397119f9f14f60afb617