Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2024, 15:46 UTC

General

  • Target

    monkey.exe

  • Size

    3.1MB

  • MD5

    9859a252dd5d39d77b4dbdc38d0e12bc

  • SHA1

    dcb2d45e7bcdf20230a397d88badf2f27e0c3b54

  • SHA256

    95aaca4f14c31d00d6b5d2b40d0dd13e4e8f47fe6bea49388119527f3700f597

  • SHA512

    42973931e4dabdbef5a3d63d91641c86360e3422c842b178b1fd512f17963f1f0f25dee87b62183e132a2c7f431dc974718c4453cf53e7f002ebe17671a8bbe9

  • SSDEEP

    49152:/vOI22SsaNYfdPBldt698dBcjHfzRJ6ibR3LoGdrBTHHB72eh2NT:/vj22SsaNYfdPBldt6+dBcjHfzRJ6c

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

255.255.255.0:4782

Mutex

5d8ed293-df10-4841-a52b-8692fbf47f38

Attributes
  • encryption_key

    11B8D109A02D98C9240E47185440CD1BFD88612D

  • install_name

    monkey.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\monkey.exe
    "C:\Users\Admin\AppData\Local\Temp\monkey.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Roaming\SubDir\monkey.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\monkey.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SubDir\monkey.exe

    Filesize

    3.1MB

    MD5

    9859a252dd5d39d77b4dbdc38d0e12bc

    SHA1

    dcb2d45e7bcdf20230a397d88badf2f27e0c3b54

    SHA256

    95aaca4f14c31d00d6b5d2b40d0dd13e4e8f47fe6bea49388119527f3700f597

    SHA512

    42973931e4dabdbef5a3d63d91641c86360e3422c842b178b1fd512f17963f1f0f25dee87b62183e132a2c7f431dc974718c4453cf53e7f002ebe17671a8bbe9

  • memory/2712-8-0x00000000001A0000-0x00000000004C4000-memory.dmp

    Filesize

    3.1MB

  • memory/2712-9-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

    Filesize

    9.9MB

  • memory/2712-10-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

    Filesize

    9.9MB

  • memory/2712-11-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

    Filesize

    9.9MB

  • memory/3040-0-0x000007FEF5EE3000-0x000007FEF5EE4000-memory.dmp

    Filesize

    4KB

  • memory/3040-1-0x0000000001070000-0x0000000001394000-memory.dmp

    Filesize

    3.1MB

  • memory/3040-2-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

    Filesize

    9.9MB

  • memory/3040-7-0x000007FEF5EE0000-0x000007FEF68CC000-memory.dmp

    Filesize

    9.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.