Analysis

  • max time kernel
    124s
  • max time network
    116s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-11-2024 00:53

General

  • Target

    RegEdit.exe

  • Size

    3.1MB

  • MD5

    bfacb0c11a720d61c03412d7f68fb8df

  • SHA1

    06c5304b3d6d75734ae3f8f30c9486dd855f0335

  • SHA256

    e8156e44befb5335f9c18acdd0d428c3a8fa316546a71fbbbd2c64c08f697a3e

  • SHA512

    89a8dcf157e7b390f946925273d34c3f6bf2cdef62e2908f96ceb64e4dbd12d5cb353c7b0e2a37ff59187dd33d3c95ab640295c433ff8e4df760baca3a127cda

  • SSDEEP

    49152:uvHI22SsaNYfdPBldt698dBcjHqEFlymzknoGd9UTHHB72eh2NT:uvo22SsaNYfdPBldt6+dBcjHqEFlE

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

dumby bo got ratted LOLOL

C2

p-surplus.gl.at.ply.gg:7938

Mutex

6f229673-e6d0-41b5-a1e4-1cbc29eeffd8

Attributes
  • encryption_key

    84EEFDB37698E582E7732B4568EC490426D1D6DF

  • install_name

    d1aler.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Java updater

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RegEdit.exe
    "C:\Users\Admin\AppData\Local\Temp\RegEdit.exe"
    1⤵
    • Drops file in System32 directory
    • Runs regedit.exe
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4164
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\d1aler.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3164
    • C:\Windows\system32\SubDir\d1aler.exe
      "C:\Windows\system32\SubDir\d1aler.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\d1aler.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2400
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /delete /tn "Java updater" /f
        3⤵
          PID:3160
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r5ZTpomvY2Vh.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Windows\system32\chcp.com
            chcp 65001
            4⤵
              PID:4888
            • C:\Windows\system32\PING.EXE
              ping -n 10 localhost
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2432

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\r5ZTpomvY2Vh.bat

        Filesize

        200B

        MD5

        e8c1a8261ab96f1a6487e9bf5f11988f

        SHA1

        f028ac2ed1d7fbbe6d628436a613e564af854856

        SHA256

        183af9d2566b2663779923fd5cbb8116f9ef3e4a01eb74c66e460ba641bd867d

        SHA512

        b8ec75ab9bc84a7075a947202094a4628496381f2049de5db045e420b3cabfde4e4981a36f0f45349ee4eb61be96092f73a00c137a0370f1d357ffb3e1716c57

      • C:\Windows\System32\SubDir\d1aler.exe

        Filesize

        3.1MB

        MD5

        bfacb0c11a720d61c03412d7f68fb8df

        SHA1

        06c5304b3d6d75734ae3f8f30c9486dd855f0335

        SHA256

        e8156e44befb5335f9c18acdd0d428c3a8fa316546a71fbbbd2c64c08f697a3e

        SHA512

        89a8dcf157e7b390f946925273d34c3f6bf2cdef62e2908f96ceb64e4dbd12d5cb353c7b0e2a37ff59187dd33d3c95ab640295c433ff8e4df760baca3a127cda

      • memory/1948-19-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

        Filesize

        10.8MB

      • memory/1948-16-0x000000001C9F0000-0x000000001CA02000-memory.dmp

        Filesize

        72KB

      • memory/1948-27-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

        Filesize

        10.8MB

      • memory/1948-10-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

        Filesize

        10.8MB

      • memory/1948-11-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

        Filesize

        10.8MB

      • memory/1948-12-0x000000001C950000-0x000000001C9A0000-memory.dmp

        Filesize

        320KB

      • memory/1948-13-0x000000001CA60000-0x000000001CB12000-memory.dmp

        Filesize

        712KB

      • memory/1948-20-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

        Filesize

        10.8MB

      • memory/1948-17-0x000000001D270000-0x000000001D2AC000-memory.dmp

        Filesize

        240KB

      • memory/1948-18-0x000000001DAE0000-0x000000001E008000-memory.dmp

        Filesize

        5.2MB

      • memory/4164-0-0x00007FFCAE873000-0x00007FFCAE875000-memory.dmp

        Filesize

        8KB

      • memory/4164-2-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

        Filesize

        10.8MB

      • memory/4164-9-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

        Filesize

        10.8MB

      • memory/4164-1-0x00000000006F0000-0x0000000000A14000-memory.dmp

        Filesize

        3.1MB