Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/11/2024, 05:07
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
0e3a741ba36201716079c915282ce457
-
SHA1
0b46da777889b26338525adcc5f1a0fc2c1f27e3
-
SHA256
bc9d7ab160ae768a0d7cddd828e23c7d97dacae1f0adf71f86f3157931c2575c
-
SHA512
1beeb0fe665b0a236a142132f47d2d248f2b825d9e600e8d9a3ad5f3691aa982a93dc7828c4b06ee84e7fe40b6447c79da887f98e200304a04ef1f103ff7237c
-
SSDEEP
49152:bv2I22SsaNYfdPBldt698dBcjHkhCmYmzUloGdYITHHB72eh2NT:bvb22SsaNYfdPBldt6+dBcjHkhCmA
Malware Config
Extracted
quasar
1.4.1
Víctima
crismulticuenta-30512.portmap.host:30512
d7480f6f-e85f-4b68-8813-8279e2e6cb96
-
encryption_key
8497DDBEB7064872EF356A0D1A58DE488578E1E0
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Updater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/4292-1-0x0000000000590000-0x00000000008B4000-memory.dmp family_quasar behavioral1/files/0x0028000000045053-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4512 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3112 schtasks.exe 868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4512 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4292 Client-built.exe Token: SeDebugPrivilege 4512 Client.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4512 Client.exe 4512 Client.exe 4512 Client.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4512 Client.exe 4512 Client.exe 4512 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4292 wrote to memory of 3112 4292 Client-built.exe 83 PID 4292 wrote to memory of 3112 4292 Client-built.exe 83 PID 4292 wrote to memory of 4512 4292 Client-built.exe 85 PID 4292 wrote to memory of 4512 4292 Client-built.exe 85 PID 4512 wrote to memory of 868 4512 Client.exe 86 PID 4512 wrote to memory of 868 4512 Client.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3112
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD50e3a741ba36201716079c915282ce457
SHA10b46da777889b26338525adcc5f1a0fc2c1f27e3
SHA256bc9d7ab160ae768a0d7cddd828e23c7d97dacae1f0adf71f86f3157931c2575c
SHA5121beeb0fe665b0a236a142132f47d2d248f2b825d9e600e8d9a3ad5f3691aa982a93dc7828c4b06ee84e7fe40b6447c79da887f98e200304a04ef1f103ff7237c