Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 00:33
Behavioral task
behavioral1
Sample
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe
Resource
win7-20240903-en
General
-
Target
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe
-
Size
3.1MB
-
MD5
8e2f41a8da48ee3bb6d533d7de12d621
-
SHA1
4b4f1bbfc8e8570668b55f1157791879fc272a6b
-
SHA256
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd
-
SHA512
fb78fabf6e4b4e52b375f63b687ea6758efa05a7a1b67c2df5c18cdbb9382bb34f768d340cb8386432a8b52fc7893d807409dd4857c3f46cdec54bc5745224d0
-
SSDEEP
49152:CvyI22SsaNYfdPBldt698dBcjHmIxNESEHk/inLoGdxTHHB72eh2NT:Cvf22SsaNYfdPBldt6+dBcjHdxWL
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.116:4782
7bcc4347-f38d-44cb-b66e-2a087c7e915f
-
encryption_key
84ADCD6EA0C9BEC44FAF54AEA226EC9015B89296
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Services
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2212-1-0x0000000000B10000-0x0000000000E34000-memory.dmp family_quasar behavioral1/files/0x0034000000016d64-6.dat family_quasar behavioral1/memory/2708-9-0x00000000011B0000-0x00000000014D4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2708 Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2796 schtasks.exe 2584 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2212 6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe Token: SeDebugPrivilege 2708 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2708 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2796 2212 6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe 30 PID 2212 wrote to memory of 2796 2212 6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe 30 PID 2212 wrote to memory of 2796 2212 6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe 30 PID 2212 wrote to memory of 2708 2212 6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe 32 PID 2212 wrote to memory of 2708 2212 6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe 32 PID 2212 wrote to memory of 2708 2212 6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe 32 PID 2708 wrote to memory of 2584 2708 Client.exe 33 PID 2708 wrote to memory of 2584 2708 Client.exe 33 PID 2708 wrote to memory of 2584 2708 Client.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe"C:\Users\Admin\AppData\Local\Temp\6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Services" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Windows Services" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58e2f41a8da48ee3bb6d533d7de12d621
SHA14b4f1bbfc8e8570668b55f1157791879fc272a6b
SHA2566c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd
SHA512fb78fabf6e4b4e52b375f63b687ea6758efa05a7a1b67c2df5c18cdbb9382bb34f768d340cb8386432a8b52fc7893d807409dd4857c3f46cdec54bc5745224d0