Analysis
-
max time kernel
126s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/10/2024, 17:40
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
c65338d7d892863734f74ee949cb7a16
-
SHA1
50151ab64046e04bc2e8d58c7c3bff0991299e9b
-
SHA256
14cad65e79b0d7faf6829d7c30bf504ae66e4adc0a28981eb50e5d00465e0645
-
SHA512
c0fa19c86ecb29c62569b7681be92f75b3f6b85d41623b7e26ee6ebd26ce3c91f4dbdfdcc47a05c681e2f496d9b0644cd64b07fb2168b1b119b7d503c539f6d0
-
SSDEEP
49152:Svht62XlaSFNWPjljiFa2RoUYIV34abRDKLoGOZTHHB72eh2NT:SvL62XlaSFNWPjljiFXRoUYIV34K0
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.28:4782
03ef2b9a-5389-4312-b3d3-9b6f68cc5386
-
encryption_key
F8A900CD75D848E74023B3A66FA8AA5469C97692
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
.
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2824-1-0x0000000000370000-0x0000000000694000-memory.dmp family_quasar behavioral1/files/0x003500000001543d-5.dat family_quasar behavioral1/memory/2852-8-0x0000000001210000-0x0000000001534000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2852 Client.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\. = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client-built.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\. = "\"C:\\Users\\Admin\\AppData\\Roaming\\SubDir\\Client.exe\"" Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe 2700 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 Client-built.exe Token: SeDebugPrivilege 2852 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2852 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2908 2824 Client-built.exe 30 PID 2824 wrote to memory of 2908 2824 Client-built.exe 30 PID 2824 wrote to memory of 2908 2824 Client-built.exe 30 PID 2824 wrote to memory of 2852 2824 Client-built.exe 32 PID 2824 wrote to memory of 2852 2824 Client-built.exe 32 PID 2824 wrote to memory of 2852 2824 Client-built.exe 32 PID 2852 wrote to memory of 2700 2852 Client.exe 33 PID 2852 wrote to memory of 2700 2852 Client.exe 33 PID 2852 wrote to memory of 2700 2852 Client.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "." /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "." /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5c65338d7d892863734f74ee949cb7a16
SHA150151ab64046e04bc2e8d58c7c3bff0991299e9b
SHA25614cad65e79b0d7faf6829d7c30bf504ae66e4adc0a28981eb50e5d00465e0645
SHA512c0fa19c86ecb29c62569b7681be92f75b3f6b85d41623b7e26ee6ebd26ce3c91f4dbdfdcc47a05c681e2f496d9b0644cd64b07fb2168b1b119b7d503c539f6d0