Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-10-2024 17:33
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
e35d832888fda0fd705386a4b94ecc49
-
SHA1
86380c3eea496c7947c25c547748cfeed51c4de9
-
SHA256
aa3170ce6b4bbd9960ac0ccd60f7d0b39cc0d28254bfe73545b540cbd8444b21
-
SHA512
60d6aec705948474fa007dad26fdba9b92dcb1098aefb4eed2898af7b048729e4a3ee5af7e7b9ca9e555b97b54f6d97007dfc1531d0abb9e5da01b5911c5fd63
-
SSDEEP
49152:Av4lL26AaNeWgPhlmVqvMQ7XSKNEREuY4oGdPwTHHB72eh2NT:AvQL26AaNeWgPhlmVqkQ7XSKmREuT
Malware Config
Extracted
quasar
1.4.1
Office04
HomoThugger-36407.portmap.host:36407
42d6f4c0-e8fc-473a-b92d-ded3fb29334a
-
encryption_key
3CDA48FEB25557C87485A9F37CDC861398BEA3C7
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3704-1-0x00000000004B0000-0x00000000007D4000-memory.dmp family_quasar -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 10 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 3064 PING.EXE 636 PING.EXE 4104 PING.EXE 2592 PING.EXE 4228 PING.EXE 3524 PING.EXE 3124 PING.EXE 2956 PING.EXE 4312 PING.EXE 5032 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133739192183529939" chrome.exe -
Runs ping.exe 1 TTPs 10 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 5032 PING.EXE 3524 PING.EXE 3064 PING.EXE 3124 PING.EXE 2592 PING.EXE 4312 PING.EXE 636 PING.EXE 4104 PING.EXE 2956 PING.EXE 4228 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 124 schtasks.exe 2636 schtasks.exe 2524 schtasks.exe 1028 schtasks.exe 4984 schtasks.exe 4996 schtasks.exe 2248 schtasks.exe 1736 schtasks.exe 952 schtasks.exe 4904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 2316 chrome.exe 2316 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid Process 4