Analysis
-
max time kernel
253s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 22:03
Behavioral task
behavioral1
Sample
Quasar.v1.4.1.zip
Resource
win10v2004-20241007-en
General
-
Target
Quasar.v1.4.1.zip
-
Size
3.3MB
-
MD5
13aa4bf4f5ed1ac503c69470b1ede5c1
-
SHA1
c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00
-
SHA256
4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62
-
SHA512
767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d
-
SSDEEP
49152:lYLmNgMh/9yUsRFeWMyYISDSwtfxZQNemi57PdHmeFINp/lFnsDbNFNepL6DJo+J:mL9U1yUUQykOQ91XFYBlR8P9d5uNJo9
Malware Config
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ce8-46.dat family_quasar behavioral1/memory/1904-57-0x000002554B690000-0x000002554B7C8000-memory.dmp family_quasar -
Executes dropped EXE 3 IoCs
pid Process 1904 Quasar.exe 4092 Quasar.exe 2136 Quasar.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3848 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeRestorePrivilege 3848 7zFM.exe Token: 35 3848 7zFM.exe Token: SeSecurityPrivilege 3848 7zFM.exe Token: SeSecurityPrivilege 3848 7zFM.exe Token: SeDebugPrivilege 1904 Quasar.exe Token: SeSecurityPrivilege 3848 7zFM.exe Token: SeDebugPrivilege 4092 Quasar.exe Token: SeSecurityPrivilege 3848 7zFM.exe Token: SeDebugPrivilege 2136 Quasar.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe 3848 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3848 wrote to memory of 1904 3848 7zFM.exe 99 PID 3848 wrote to memory of 1904 3848 7zFM.exe 99 PID 3848 wrote to memory of 4092 3848 7zFM.exe 104 PID 3848 wrote to memory of 4092 3848 7zFM.exe 104 PID 3848 wrote to memory of 2136 3848 7zFM.exe 107 PID 3848 wrote to memory of 2136 3848 7zFM.exe 107
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Quasar.v1.4.1.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\7zO80FBB668\Quasar.exe"C:\Users\Admin\AppData\Local\Temp\7zO80FBB668\Quasar.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\7zO80FC3898\Quasar.exe"C:\Users\Admin\AppData\Local\Temp\7zO80FC3898\Quasar.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\7zO80F4765B\Quasar.exe"C:\Users\Admin\AppData\Local\Temp\7zO80F4765B\Quasar.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD512ebf922aa80d13f8887e4c8c5e7be83
SHA17f87a80513e13efd45175e8f2511c2cd17ff51e8
SHA25643315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e
SHA512fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275