Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-11-2024 19:30

General

  • Target

    robloxtockenstealer.exe

  • Size

    3.2MB

  • MD5

    e7c12a69820f13031fbc2a3bfe6cff2b

  • SHA1

    8959411ec12367b73ceb4971eb0bed6bf8773a35

  • SHA256

    e37f5e8a493f127516a17a57e47bb891d665f8a0aed15871c8551c94b38398e4

  • SHA512

    25a4a9124d386ece9a3c044d7bc0d03281b901ec8d6f96b840d51f7ec0702da9bf16f07fdda98b0a15409ca604629b3220cbcdc9cff24629eeeb38462282ecde

  • SSDEEP

    98304:DFqg2FttFGwikj7yVEErTRHX0tsEwwjBWOWeYMWmWjn2:DFqgibV7yVDrFHEtsEwwIFM3

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.56.1:4782

Mutex

47f0198a-a3d8-4194-852e-7997def309cf

Attributes
  • encryption_key

    C420C6BA5A73AFC71829A3D6D18F010F1FDAE794

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\robloxtockenstealer.exe
    "C:\Users\Admin\AppData\Local\Temp\robloxtockenstealer.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\FUD.vbs"
      2⤵
        PID:2972
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\roblox token stealer.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\roblox token stealer.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\system32\schtasks.exe
          "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2604
        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Windows\system32\schtasks.exe
            "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2280

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\FUD.vbs

      Filesize

      4.2MB

      MD5

      9cca465069a35bae68cc1b82da88f003

      SHA1

      027110cc613450604ebaf1dd2cbf8a955b82b6a3

      SHA256

      93fc739111a31cc09e04d1ebd4fa635dd4e30cdbc5d660c649c53c01d44d9e42

      SHA512

      17039a9e6fc039215c4310fc485755c074089e06d0ff377ebfd47706da75b9716e59d7a6d793ee87529428eb47bb8e5050b7e0eca0d6ec4195e412137eb48bef

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\roblox token stealer.exe

      Filesize

      3.1MB

      MD5

      84ac4a7dac25c96d418f9dc5e1191f0e

      SHA1

      bdcb752789e55531baa65a7bfd81ddd86c89514a

      SHA256

      7ca6aefc5551b2b2ee2576b8042e900e0c6b6479c5225f08a31699c8f086c9be

      SHA512

      22bd55c247dc9dc5644cabcb31a09e76694d3e144ec23b7b17b4730cd24cfcc6b8d7e389b7d46fde48862dfeff3e237083e67321cd978aa63fac1a87f19c86a8

    • memory/2152-16-0x000007FEF52E3000-0x000007FEF52E4000-memory.dmp

      Filesize

      4KB

    • memory/2152-17-0x0000000000020000-0x0000000000344000-memory.dmp

      Filesize

      3.1MB

    • memory/2152-18-0x000007FEF52E0000-0x000007FEF5CCC000-memory.dmp

      Filesize

      9.9MB

    • memory/2152-25-0x000007FEF52E0000-0x000007FEF5CCC000-memory.dmp

      Filesize

      9.9MB

    • memory/2572-24-0x0000000001090000-0x00000000013B4000-memory.dmp

      Filesize

      3.1MB