Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2024, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
B658C5D7ED9CD9D40992885120E78450.exe
Resource
win7-20240903-en
General
-
Target
B658C5D7ED9CD9D40992885120E78450.exe
-
Size
3.3MB
-
MD5
b658c5d7ed9cd9d40992885120e78450
-
SHA1
a96eede3e39827b1f975c1dfdec8917b981f1330
-
SHA256
36c5e613a6f16466cfbea6b74f926cb9d357bf78e1e229d9f47f38e7b78a7291
-
SHA512
62e9bfc7fac1e3a26ba3578f49d800793c5ffa02bb61786c600c69808424047285a297438075c40539fb96cbea4652a1bfdcf36e5b86b9a0687c6f67502855be
-
SSDEEP
98304:smDurDWcs5SUUhjH5iv1B/fGJD21MV4tJ+r3dXmJ:smOW5Chj5iv1B/fED21mrgJ
Malware Config
Extracted
quasar
1.4.1
Office04
83.168.110.87:4782
e7550a93-a385-490f-a2f8-5d9e1b5fd98b
-
encryption_key
19FB99CC4D38C38330C88E623B7FD5B15277B769
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
puttystart
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023bc5-7.dat family_quasar behavioral2/memory/2836-16-0x00000000003B0000-0x00000000006D4000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation B658C5D7ED9CD9D40992885120E78450.exe -
Executes dropped EXE 2 IoCs
pid Process 2836 Client-built.exe 1828 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B658C5D7ED9CD9D40992885120E78450.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1400 schtasks.exe 3236 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2836 Client-built.exe Token: SeDebugPrivilege 1828 Client.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1828 Client.exe 1828 Client.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1828 Client.exe 1828 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1828 Client.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3596 wrote to memory of 2836 3596 B658C5D7ED9CD9D40992885120E78450.exe 87 PID 3596 wrote to memory of 2836 3596 B658C5D7ED9CD9D40992885120E78450.exe 87 PID 2836 wrote to memory of 1400 2836 Client-built.exe 88 PID 2836 wrote to memory of 1400 2836 Client-built.exe 88 PID 2836 wrote to memory of 1828 2836 Client-built.exe 90 PID 2836 wrote to memory of 1828 2836 Client-built.exe 90 PID 1828 wrote to memory of 3236 1828 Client.exe 93 PID 1828 wrote to memory of 3236 1828 Client.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\B658C5D7ED9CD9D40992885120E78450.exe"C:\Users\Admin\AppData\Local\Temp\B658C5D7ED9CD9D40992885120E78450.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "puttystart" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1400
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "puttystart" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e456f2449b504e6af29acb9c1e0ebd25
SHA14680b936eca2d5a88cbeed164b54a0b12f138892
SHA2567ce80a4a4932516cf8163f73c85537e621b0a1e1a0c0fda41da1f71b1867dfc6
SHA512ffe8788bae2143eb5b68f57edb3ded569bc1e75390bc48a7eb92e65a95688d34229039001d80f717f1c14e650fe94c01ec6e9438dac045af17569dc6811ab281