Analysis
-
max time kernel
17s -
max time network
20s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
16-11-2024 19:29
Static task
static1
General
-
Target
roblox tocken stealer.exe
-
Size
3.2MB
-
MD5
e7c12a69820f13031fbc2a3bfe6cff2b
-
SHA1
8959411ec12367b73ceb4971eb0bed6bf8773a35
-
SHA256
e37f5e8a493f127516a17a57e47bb891d665f8a0aed15871c8551c94b38398e4
-
SHA512
25a4a9124d386ece9a3c044d7bc0d03281b901ec8d6f96b840d51f7ec0702da9bf16f07fdda98b0a15409ca604629b3220cbcdc9cff24629eeeb38462282ecde
-
SSDEEP
98304:DFqg2FttFGwikj7yVEErTRHX0tsEwwjBWOWeYMWmWjn2:DFqgibV7yVDrFHEtsEwwIFM3
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.56.1:4782
47f0198a-a3d8-4194-852e-7997def309cf
-
encryption_key
C420C6BA5A73AFC71829A3D6D18F010F1FDAE794
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x002800000004509f-12.dat family_quasar behavioral1/memory/3832-23-0x0000000000970000-0x0000000000C94000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation roblox tocken stealer.exe -
Executes dropped EXE 2 IoCs
pid Process 3832 roblox token stealer.exe 356 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000_Classes\Local Settings roblox tocken stealer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe 3080 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3832 roblox token stealer.exe Token: SeDebugPrivilege 356 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 356 Client.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4264 4916 roblox tocken stealer.exe 82 PID 4916 wrote to memory of 4264 4916 roblox tocken stealer.exe 82 PID 4916 wrote to memory of 3832 4916 roblox tocken stealer.exe 92 PID 4916 wrote to memory of 3832 4916 roblox tocken stealer.exe 92 PID 3832 wrote to memory of 2508 3832 roblox token stealer.exe 94 PID 3832 wrote to memory of 2508 3832 roblox token stealer.exe 94 PID 3832 wrote to memory of 356 3832 roblox token stealer.exe 96 PID 3832 wrote to memory of 356 3832 roblox token stealer.exe 96 PID 356 wrote to memory of 3080 356 Client.exe 97 PID 356 wrote to memory of 3080 356 Client.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\roblox tocken stealer.exe"C:\Users\Admin\AppData\Local\Temp\roblox tocken stealer.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\FUD.vbs"2⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\roblox token stealer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\roblox token stealer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2508
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD59cca465069a35bae68cc1b82da88f003
SHA1027110cc613450604ebaf1dd2cbf8a955b82b6a3
SHA25693fc739111a31cc09e04d1ebd4fa635dd4e30cdbc5d660c649c53c01d44d9e42
SHA51217039a9e6fc039215c4310fc485755c074089e06d0ff377ebfd47706da75b9716e59d7a6d793ee87529428eb47bb8e5050b7e0eca0d6ec4195e412137eb48bef
-
Filesize
3.1MB
MD584ac4a7dac25c96d418f9dc5e1191f0e
SHA1bdcb752789e55531baa65a7bfd81ddd86c89514a
SHA2567ca6aefc5551b2b2ee2576b8042e900e0c6b6479c5225f08a31699c8f086c9be
SHA51222bd55c247dc9dc5644cabcb31a09e76694d3e144ec23b7b17b4730cd24cfcc6b8d7e389b7d46fde48862dfeff3e237083e67321cd978aa63fac1a87f19c86a8