Resubmissions

09-11-2024 14:57

241109-sbr6lawgmc 10

09-11-2024 14:55

241109-sasezawhkj 10

Analysis

  • max time kernel
    85s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09-11-2024 14:57

General

  • Target

    Quasar.v1.4.1.zip

  • Size

    3.3MB

  • MD5

    13aa4bf4f5ed1ac503c69470b1ede5c1

  • SHA1

    c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

  • SHA256

    4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

  • SHA512

    767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

  • SSDEEP

    49152:lYLmNgMh/9yUsRFeWMyYISDSwtfxZQNemi57PdHmeFINp/lFnsDbNFNepL6DJo+J:mL9U1yUUQykOQ91XFYBlR8P9d5uNJo9

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 51 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Quasar.v1.4.1.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4020
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1144
    • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
      "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4552
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe" /select, "C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12"
        2⤵
          PID:3452
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:5028

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\Desktop\Quasar v1.4.1\BouncyCastle.Crypto.dll

        Filesize

        3.2MB

        MD5

        0cf454b6ed4d9e46bc40306421e4b800

        SHA1

        9611aa929d35cbd86b87e40b628f60d5177d2411

        SHA256

        e51721dc0647f4838b1abc592bd95fd8cb924716e8a64f83d4b947821fa1fa42

        SHA512

        85262f1bc67a89911640f59a759b476b30ca644bd1a1d9cd3213cc8aae16d7cc6ea689815f19b146db1d26f7a75772ceb48e71e27940e3686a83eb2cf7e46048

      • C:\Users\Admin\Desktop\Quasar v1.4.1\Mono.Cecil.Pdb.dll

        Filesize

        87KB

        MD5

        6d5eb860c2be5dbeb470e7d3f3e7dda4

        SHA1

        80c76660b87c52127b1a7da48e27700f75362041

        SHA256

        447ede1984bb4acd73bd97c0ec57a11c079cee8301c91fb199ca98c1906d3cc4

        SHA512

        64cf4fe7de68a35720d2b9338ba9cf182e127d95d72d2ccf7ff5c73a368133663e70c988a460825fa87b2d03717a4447948d5262f56aceb7c3bf1cb3ab5a41a5

      • C:\Users\Admin\Desktop\Quasar v1.4.1\Open.Nat.dll

        Filesize

        68KB

        MD5

        cc6f6503d29a99f37b73bfd881de8ae0

        SHA1

        92d3334898dbb718408f1f134fe2914ef666ce46

        SHA256

        0b1e0d8f87f557b52315d98c1f4727e539f5120d20b4ca9edba548983213fbb5

        SHA512

        7f4c0a35b612b864ad9bc6a46370801ed7433424791622bf77bf47d6a776cb6a49e4977b34725ead5d0feaa1c9516db2ca75cb8872c77a8f2fab6c37740b681f

      • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.Common.dll

        Filesize

        62KB

        MD5

        2185564051ea2e046d9f711ed3cd93ff

        SHA1

        2f2d7fd470da6d126582ad80df2802aabd6c9cea

        SHA256

        de930a748e4dc08c851ba0a22afce8dcfd0f15f23b291f9306c8ef6ccd7460a2

        SHA512

        00af241c1f89b478e66d758db26ed0a413b690d695abf91211b5cbc3985133632327ea0fc41140bd61d02271b6aa278a8e8f539d8ca6ce94972aef50c1a9c868

      • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe

        Filesize

        1.2MB

        MD5

        12ebf922aa80d13f8887e4c8c5e7be83

        SHA1

        7f87a80513e13efd45175e8f2511c2cd17ff51e8

        SHA256

        43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

        SHA512

        fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

      • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe.config

        Filesize

        176B

        MD5

        c8cd50e8472b71736e6543f5176a0c12

        SHA1

        0bd6549820de5a07ac034777b3de60021121405e

        SHA256

        b44739eeff82db2b575a45b668893e2fe8fdd24a709cbf0554732fd3520b2190

        SHA512

        6e8f77fcca5968788cc9f73c9543ce9ab7b416372bc681093aa8a3aad43af1f06c56fcbc296c7897a3654b86a6f9d0e8b0fe036677cf290957924377bc177d9f

      • C:\Users\Admin\Desktop\Quasar v1.4.1\protobuf-net.dll

        Filesize

        282KB

        MD5

        abc82ae4f579a0bbfa2a93db1486eb38

        SHA1

        faa645b92e3de7037c23e99dd2101ef3da5756e5

        SHA256

        ca6608346291ec82ee4acf8017c90e72db2ee7598015f695120c328d25319ec6

        SHA512

        e06ee564fdd3fe2e26b0dec744a969a94e4b63a2e37692a7dcc244cb7949b584d895e9d3766ea52c9fe72b7a31dacf4551f86ea0d7c987b80903ff43be9faed3

      • C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12

        Filesize

        4KB

        MD5

        0215563b4fa759b018ce9e2b59224458

        SHA1

        95ff73f34969236a2359d40d555959683a80ce9a

        SHA256

        c356ce6814f9f2f9d5de99ac6afb2464ac050158de287e09094fd09bde8cbb5e

        SHA512

        c83d509830cb0e67d8124979f5520525eff51dae6ec958cd72586d4837900cc47240bf5954c43ffbdb02574bb2863084fc0cb04aa4fe61b937c0e7595f58e827

      • memory/4552-53-0x00000121EEE50000-0x00000121EF17E000-memory.dmp

        Filesize

        3.2MB

      • memory/4552-51-0x00007FFDC8C30000-0x00007FFDC96F2000-memory.dmp

        Filesize

        10.8MB

      • memory/4552-50-0x00000121D3C80000-0x00000121D3C96000-memory.dmp

        Filesize

        88KB

      • memory/4552-74-0x00000121EEA40000-0x00000121EEA58000-memory.dmp

        Filesize

        96KB

      • memory/4552-75-0x00000121EEAB0000-0x00000121EEB00000-memory.dmp

        Filesize

        320KB

      • memory/4552-76-0x00000121EEC00000-0x00000121EECB2000-memory.dmp

        Filesize

        712KB

      • memory/4552-78-0x00000121EEB40000-0x00000121EEB8C000-memory.dmp

        Filesize

        304KB

      • memory/4552-48-0x00000121D1E00000-0x00000121D1F38000-memory.dmp

        Filesize

        1.2MB

      • memory/4552-79-0x00007FFDC8C30000-0x00007FFDC96F2000-memory.dmp

        Filesize

        10.8MB

      • memory/4552-47-0x00007FFDC8C33000-0x00007FFDC8C35000-memory.dmp

        Filesize

        8KB