Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
7842454c707050024b8c0c9d404b2c899eb3113b6cedd6440dbb4a8c1edc8ded.exe
-
Size
4.8MB
-
Sample
241120-bkh6ls1rfn
-
MD5
801303f345e4790e5360787751642a08
-
SHA1
ee78b821317d1d68a995cd910cebca712362a4ce
-
SHA256
7842454c707050024b8c0c9d404b2c899eb3113b6cedd6440dbb4a8c1edc8ded
-
SHA512
495c440aecd70e880b5bb0dd510fcd99949afec14c2abbaa4ccaf2ffd10abb56cd67a3a478ca385710fa0525463cbf971b8b510d4f775efb91bb1e045992ea4f
-
SSDEEP
98304:j3GccrcRznayXbOokuicn7TfKoJ5h7a5UgiLTAGSTqzG/jI39vBVszxKu:j3G6RzntKHk7TCoVaDiLcgzOUZByz8u
Static task
static1
Behavioral task
behavioral1
Sample
7842454c707050024b8c0c9d404b2c899eb3113b6cedd6440dbb4a8c1edc8ded.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.0
4Drun
185.148.3.216:4000
c3557859-56ac-475e-b44d-e1b60c20d0d0
-
encryption_key
B000736BEBDF08FC1B6696200651882CF57E43E7
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
3dfx Startup
-
subdirectory
SubDir
Targets
-
-
Target
7842454c707050024b8c0c9d404b2c899eb3113b6cedd6440dbb4a8c1edc8ded.exe
-
Size
4.8MB
-
MD5
801303f345e4790e5360787751642a08
-
SHA1
ee78b821317d1d68a995cd910cebca712362a4ce
-
SHA256
7842454c707050024b8c0c9d404b2c899eb3113b6cedd6440dbb4a8c1edc8ded
-
SHA512
495c440aecd70e880b5bb0dd510fcd99949afec14c2abbaa4ccaf2ffd10abb56cd67a3a478ca385710fa0525463cbf971b8b510d4f775efb91bb1e045992ea4f
-
SSDEEP
98304:j3GccrcRznayXbOokuicn7TfKoJ5h7a5UgiLTAGSTqzG/jI39vBVszxKu:j3G6RzntKHk7TCoVaDiLcgzOUZByz8u
-
Modifies security service
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1