Analysis

  • max time kernel
    434s
  • max time network
    430s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 16:13

General

  • Target

    https://github.com/quasar/Quasar/releases/download/v1.4.1/Quasar.v1.4.1.zip

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/quasar/Quasar/releases/download/v1.4.1/Quasar.v1.4.1.zip
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8231146f8,0x7ff823114708,0x7ff823114718
      2⤵
        PID:4944
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:2
        2⤵
          PID:1408
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3968
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:8
          2⤵
            PID:3192
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
            2⤵
              PID:4916
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              2⤵
                PID:2388
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:8
                2⤵
                  PID:3436
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4860
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4660 /prefetch:8
                  2⤵
                    PID:1804
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                    2⤵
                      PID:4344
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4384
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:1
                      2⤵
                        PID:5144
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:1
                        2⤵
                          PID:5152
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:1
                          2⤵
                            PID:5308
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                            2⤵
                              PID:5316
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,3624288924939728994,9045911539326838801,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5568 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4144
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4244
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2480
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:3436
                                • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                                  "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4900
                                  • C:\Windows\explorer.exe
                                    "C:\Windows\explorer.exe" /select, "C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12"
                                    2⤵
                                      PID:5708
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                    1⤵
                                    • Modifies Internet Explorer settings
                                    • Modifies registry class
                                    • Suspicious behavior: AddClipboardFormatListener
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5812
                                  • C:\Windows\system32\cmd.exe
                                    "C:\Windows\system32\cmd.exe"
                                    1⤵
                                      PID:5608
                                      • C:\Windows\system32\ipconfig.exe
                                        ipconfig
                                        2⤵
                                        • Gathers network information
                                        PID:5820

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      dc058ebc0f8181946a312f0be99ed79c

                                      SHA1

                                      0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                      SHA256

                                      378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                      SHA512

                                      36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      a0486d6f8406d852dd805b66ff467692

                                      SHA1

                                      77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                      SHA256

                                      c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                      SHA512

                                      065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      265B

                                      MD5

                                      f5cd008cf465804d0e6f39a8d81f9a2d

                                      SHA1

                                      6b2907356472ed4a719e5675cc08969f30adc855

                                      SHA256

                                      fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                      SHA512

                                      dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      a46891578fb42e6219bec58622a165ae

                                      SHA1

                                      aeab66f232a5e30a25a50aef2039b1c0efb07d8d

                                      SHA256

                                      3ba210d284382c80af549790a8086b59ca22ba793bcd892143084a59ab3349f8

                                      SHA512

                                      6de0b893e5dd5f9699b6fe67a570b284e63d724cfbe465658ab14ac3f3dad18cdac2b117e8d1e94d89eb78ec633514365f3853aefde39d3084ceb4a33295b38b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      377847d8780b311bb86518a836a5b05d

                                      SHA1

                                      4bf022c393e147b4b857e0585b1a512e0caa1d22

                                      SHA256

                                      6d3c3af4ba8dec45793698e87d0fd1bc06b2007d28e1923f79b26c82f8e7070b

                                      SHA512

                                      ff1771df8c6b2e8df170dc3805419a29e11952fe7de1624e853b3bb8befe5cb5031722106bf201363a7c10d7b41d79609a5b09a427607395f0d8cee590177924

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      b210fd94169357431e0d4e7a38216b8c

                                      SHA1

                                      24288e193c10e11fc50ace7803f35088a12936a9

                                      SHA256

                                      08491bc252ab01c8aaaa39c05ca0123da929454d44d04346428b5609fb02a1cd

                                      SHA512

                                      d59fa4c9bb07b14bef0497e3b3613447dffc10bf410332d18c4ee0394ed3126e0dffcffd7a92ad1abe4f76edfc80ed1518e0eedd0cb3e4d760cb556715904585

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3756129449-3121373848-4276368241-1000\09484630c260ad23096f065356732413_a63d6fdc-08cb-4232-ab51-76cafdcb4d96

                                      Filesize

                                      3KB

                                      MD5

                                      61dde0864c31456e90888985aab29920

                                      SHA1

                                      4b30f62f1ce4be281b5444de657d378dd903d521

                                      SHA256

                                      1416ff8fc500b76234e2be7d322fcc9a45389ab43ae0f4fbc192d07524fdd6e9

                                      SHA512

                                      1e95f9c2b963c22aca0eefb5bc492daf633cbe7c6cee3ccf2ef0c3b7a2859ce8b12401498dd7034583e9d4ec4516a2ae44e1d4017d28ad6c5d5cae37fd384f65

                                    • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                      Filesize

                                      161B

                                      MD5

                                      c54b3baa078e48b19fb46796412002c6

                                      SHA1

                                      f5e6763db392bbfb6f5f67744ad099bb47494415

                                      SHA256

                                      08a60cc21699e7c33af62faef4c5ba077c8a6eba4068e141eaf04601e4684889

                                      SHA512

                                      761140e40240b73b145fc213239ddfc96827f060cffad62ae64a64b8b7e001b60ed3a116fb9226e68c64351dfa0b224e9348dd452e9b35a46fe1cc1607c58db9

                                    • C:\Users\Admin\Desktop\Quasar v1.4.1\Profiles\Default.xml

                                      Filesize

                                      1KB

                                      MD5

                                      335724a26b1925a8f77242c88b58d89f

                                      SHA1

                                      68d7f221b04a2d3535ca60e037de0c090533361e

                                      SHA256

                                      8817b9cdf9cb5d4f878abed22afbe05b51d481dc53f302dfd5ff5f6ddca2b6d2

                                      SHA512

                                      8044ee14a876fcaf4a0ba376e82014d587bb125a69320d1b86a1eea0d1b82cc19c3f3ca2a6ecd134b8c6b8b66c7e88a97440bcc9b8f171da0b7fe7b31088c119

                                    • C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12

                                      Filesize

                                      4KB

                                      MD5

                                      6fcce9b041859252638619c117922401

                                      SHA1

                                      a11f4e818d276ab0bfd2d3829d8e3898c260052b

                                      SHA256

                                      fd8860e9a4cc5c2dca9126d8695ac27258fbffa9bc492ad01b2e213f0d19b0b5

                                      SHA512

                                      52b48fc2b41d6f2118450a4832ea145ba9c840cbbdf47b305f4371e2d2bbe40e9bb2c6d95f7c7710b9b5574be6b1588137a858fbd9e524851ef705bba49b62d4

                                    • C:\Users\Admin\Downloads\Quasar.v1.4.1.zip

                                      Filesize

                                      3.3MB

                                      MD5

                                      13aa4bf4f5ed1ac503c69470b1ede5c1

                                      SHA1

                                      c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

                                      SHA256

                                      4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

                                      SHA512

                                      767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

                                    • memory/4900-64-0x0000023579C00000-0x0000023579F2E000-memory.dmp

                                      Filesize

                                      3.2MB

                                    • memory/4900-105-0x00000235799A0000-0x0000023579A52000-memory.dmp

                                      Filesize

                                      712KB

                                    • memory/4900-106-0x00000235798E0000-0x000002357992C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/4900-103-0x0000023578DB0000-0x0000023578DC8000-memory.dmp

                                      Filesize

                                      96KB

                                    • memory/4900-154-0x000002357CC80000-0x000002357CC9A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/4900-104-0x0000023579040000-0x0000023579090000-memory.dmp

                                      Filesize

                                      320KB

                                    • memory/4900-153-0x000002357D140000-0x000002357D19E000-memory.dmp

                                      Filesize

                                      376KB

                                    • memory/4900-63-0x000002355C880000-0x000002355C896000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/4900-62-0x000002355C360000-0x000002355C498000-memory.dmp

                                      Filesize

                                      1.2MB