Analysis
-
max time kernel
249s -
max time network
266s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06-11-2024 22:00
General
-
Target
porfaaa.exe
-
Size
3.1MB
-
MD5
6a0e509826fa8bbebabe5f79ace2ef27
-
SHA1
aec54ebce312edce5ba80335aebcc7b599383166
-
SHA256
569da6bbe85c8810e6f9cf1b884be9257a227d4c29c4c81888999c0e583cba80
-
SHA512
442653aa58c5287131e7d4ac90609c4f05a92992e44d9efadd06bed60e25bd1f7eb2f89588b792243dc4b70cd1f64e2f017874e1a6b38b9807de2c90c9afcfaf
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjH7bRJ65bR3LoGd4BTHHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjH7bRJ67I
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.9:139
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/1684-1-0x0000000000A80000-0x0000000000DA4000-memory.dmp family_quasar behavioral1/files/0x0028000000045048-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2916 Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3296 schtasks.exe 4532 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 porfaaa.exe Token: SeDebugPrivilege 2916 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2916 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1684 wrote to memory of 4532 1684 porfaaa.exe 84 PID 1684 wrote to memory of 4532 1684 porfaaa.exe 84 PID 1684 wrote to memory of 2916 1684 porfaaa.exe 86 PID 1684 wrote to memory of 2916 1684 porfaaa.exe 86 PID 2916 wrote to memory of 3296 2916 Client.exe 89 PID 2916 wrote to memory of 3296 2916 Client.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\porfaaa.exe"C:\Users\Admin\AppData\Local\Temp\porfaaa.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4532
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56a0e509826fa8bbebabe5f79ace2ef27
SHA1aec54ebce312edce5ba80335aebcc7b599383166
SHA256569da6bbe85c8810e6f9cf1b884be9257a227d4c29c4c81888999c0e583cba80
SHA512442653aa58c5287131e7d4ac90609c4f05a92992e44d9efadd06bed60e25bd1f7eb2f89588b792243dc4b70cd1f64e2f017874e1a6b38b9807de2c90c9afcfaf