Analysis
-
max time kernel
1049s -
max time network
1052s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
31-10-2024 00:58
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
fa0417d4b9f177a8cecfd88b345a7b28
-
SHA1
85770ee9f13a58e5eb95fcfb3868fcf626ad6552
-
SHA256
9e9ff4b542d31bc8a8a52099758c9cb274727d341881c8df448d8f33ffc20117
-
SHA512
f7d6ae87130fb63da8c53a26e384d364b2706096f3cce6a74add75ed62c50e6b93748e388eae27132b772a5e017db1166c519a946a067d46157917f2f638b79e
-
SSDEEP
49152:mv0t62XlaSFNWPjljiFa2RoUYIDQOEEfsUk/HYEoGdBVTHHB72eh2NT:mvo62XlaSFNWPjljiFXRoUYIDQOG/
Malware Config
Extracted
quasar
1.4.1
Office04
10.127.0.227:4782
cc382a3d-9ce3-4b59-ba4b-40acd01a72a5
-
encryption_key
955952829EF4D4C700D061DBC84790B29C3FF5DD
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java update
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2512-1-0x0000000000620000-0x0000000000944000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid Process 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid Process 1064 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Client-built.exetaskmgr.exedescription pid Process Token: SeDebugPrivilege 2512 Client-built.exe Token: SeDebugPrivilege 1064 taskmgr.exe Token: SeSystemProfilePrivilege 1064 taskmgr.exe Token: SeCreateGlobalPrivilege 1064 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Client-built.exetaskmgr.exepid Process 2512 Client-built.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Client-built.exetaskmgr.exepid Process 2512 Client-built.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe 1064 taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Client-built.exedescription pid Process procid_target PID 2512 wrote to memory of 3160 2512 Client-built.exe 83 PID 2512 wrote to memory of 3160 2512 Client-built.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3160
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1064