Behavioral task
behavioral1
Sample
TempWoofpriv.exe
Resource
win7-20241010-en
General
-
Target
TempWoofpriv.exe
-
Size
3.1MB
-
MD5
b9aee7a92f002f80a6b04c252b05bb29
-
SHA1
4e186ba6d401d5e45627ac789d3cf22d19698b8c
-
SHA256
72f27c509e27de2edbe9d98fa9258624260d3cabd7b9932636dceb610180d7ef
-
SHA512
b3f899e279c6f72cb8517160b747bcd44339909b61a82e4304d1e29e9e5da9506acdde8531d25ed3a3506781743c74427437dcfc6981bc992fdb5d83652cb6cd
-
SSDEEP
49152:6vWI22SsaNYfdPBldt698dBcjHRwn85kbRULoGdWiTHHB72eh2NT:6v722SsaNYfdPBldt6+dBcjHRwn85XG
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.28:4782
d77230bf-9913-4330-a1f9-b2094453e604
-
encryption_key
954674A032C3A24E1CEB078DEAC16D915B41486D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource TempWoofpriv.exe
Files
-
TempWoofpriv.exe.exe windows:4 windows x86 arch:x86
Password: 123
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ