Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:21
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240708-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
115b3ecdeb0aaffe00e90d5cc3c51a88
-
SHA1
24c414a2fe724d6f5310a757c5fa6f97fe61d75b
-
SHA256
7a20c6e0574d36d2d972450002eff9f226351ef2d594be1f80f33b7502649dd0
-
SHA512
872fa8e3839c8dd54faf7be7e12f7ae89ac6bed8a7fbe0fd5df8fc66e98f32ed2ed7c4446c406fade7214ccc4cc869c094e1cf0f4dad472c30f0493f165aa6e7
-
SSDEEP
49152:LvyI22SsaNYfdPBldt698dBcjHgxDEDwNk/JxhoGdsTHHB72eh2NT:Lvf22SsaNYfdPBldt6+dBcjHgxeT
Malware Config
Extracted
quasar
1.4.1
Office04
45.88.91.31:4782
67eb7beb-85a5-459d-aba7-8e55a1344249
-
encryption_key
18A3C5CC053BEC5C80BD4C5011E5C6BF640A466A
-
install_name
Chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security Notifications
-
subdirectory
SubDir
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2908-1-0x0000000000920000-0x0000000000C44000-memory.dmp family_quasar behavioral1/files/0x000800000001660d-5.dat family_quasar behavioral1/memory/2912-8-0x0000000000AA0000-0x0000000000DC4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2912 Chrome.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\SubDir\Chrome.exe Client-built.exe File opened for modification C:\Windows\system32\SubDir\Chrome.exe Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2252 schtasks.exe 2928 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2908 Client-built.exe Token: SeDebugPrivilege 2912 Chrome.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 Chrome.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2912 Chrome.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2252 2908 Client-built.exe 30 PID 2908 wrote to memory of 2252 2908 Client-built.exe 30 PID 2908 wrote to memory of 2252 2908 Client-built.exe 30 PID 2908 wrote to memory of 2912 2908 Client-built.exe 32 PID 2908 wrote to memory of 2912 2908 Client-built.exe 32 PID 2908 wrote to memory of 2912 2908 Client-built.exe 32 PID 2912 wrote to memory of 2928 2912 Chrome.exe 33 PID 2912 wrote to memory of 2928 2912 Chrome.exe 33 PID 2912 wrote to memory of 2928 2912 Chrome.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Security Notifications" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Chrome.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2252
-
-
C:\Windows\system32\SubDir\Chrome.exe"C:\Windows\system32\SubDir\Chrome.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Security Notifications" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Chrome.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5115b3ecdeb0aaffe00e90d5cc3c51a88
SHA124c414a2fe724d6f5310a757c5fa6f97fe61d75b
SHA2567a20c6e0574d36d2d972450002eff9f226351ef2d594be1f80f33b7502649dd0
SHA512872fa8e3839c8dd54faf7be7e12f7ae89ac6bed8a7fbe0fd5df8fc66e98f32ed2ed7c4446c406fade7214ccc4cc869c094e1cf0f4dad472c30f0493f165aa6e7