Analysis
-
max time kernel
123s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe
Resource
win7-20240903-en
General
-
Target
a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe
-
Size
5.8MB
-
MD5
7f4092487f658020d13296690668d937
-
SHA1
4c2e7041e90f7f651c3f514f092260fdf38d23e4
-
SHA256
a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a
-
SHA512
bf24517138ae37ad6dbb5aec2272b0db9a7aa9c38e8b1928a4e6223c624592bf2fff2ce27e3971329bd829667cfd5722ce1906b55ebb779b421bd8ec3aae749b
-
SSDEEP
98304:VdAle+Q5MpCOKdEJFZPG+chrvWREYJSqKpwR5agwxo7CH+TY9PcFO3y9jmKn+HBT:bkgMpCOL++KYMqDbSVdRf3y9jKH+U
Malware Config
Extracted
quasar
1.3.0.0
XXXNewsgroupdirect
jwy1nw4mcx2svbmvgo76.ru:4782
o6tqyui3rxxk2sfghduiypzz7pxlym.ru:4782
RHjqJCxmCalXXEe.ru:4782
xMfLSMPKBWsgmUC.ru:4782
FHXvaxLSFIDvieO.ru:4782
QfFaRBPqOoJQqEF.ru:4782
moNxVtjgeWpPVUz.ru:4782
JDIsOivQCBlbzlN.ru:4782
DGnZQjkVDhsxgVV.ru:4782
ByZBzewBiKXuqUR.ru:4782
ytXDZUKKgHETqys.ru:4782
yPZmTJDDnmJhkwf.ru:4782
QVggEpcffTSfXLG.ru:4782
DqUTFasmBwlEIBT.ru:4782
VYJjpyHabYhrJDd.ru:4782
RgNSTMHSnjafPEX.ru:4782
HoQcpHAOBoMWu5FCve
-
encryption_key
VJrLu7UGImn19bb9qL6Z
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 9 IoCs
resource yara_rule behavioral1/memory/556-21-0x00000000006C0000-0x000000000071E000-memory.dmp family_quasar behavioral1/memory/556-20-0x00000000006C0000-0x000000000071E000-memory.dmp family_quasar behavioral1/memory/556-17-0x00000000006C0000-0x000000000071E000-memory.dmp family_quasar behavioral1/memory/556-16-0x00000000006C0000-0x000000000071E000-memory.dmp family_quasar behavioral1/memory/556-30-0x00000000006C0000-0x000000000071E000-memory.dmp family_quasar behavioral1/memory/556-25-0x00000000006C0000-0x000000000071E000-memory.dmp family_quasar behavioral1/memory/1776-62-0x00000000000F0000-0x000000000014E000-memory.dmp family_quasar behavioral1/memory/1776-60-0x00000000000F0000-0x000000000014E000-memory.dmp family_quasar behavioral1/memory/1776-55-0x00000000000F0000-0x000000000014E000-memory.dmp family_quasar -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com 5 ip-api.com -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2684 set thread context of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2880 set thread context of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1888 PING.EXE 3024 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1888 PING.EXE 3024 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe 2200 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 556 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe Token: SeDebugPrivilege 1776 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2600 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 32 PID 2684 wrote to memory of 2600 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 32 PID 2684 wrote to memory of 2600 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 32 PID 2684 wrote to memory of 2600 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 32 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 2684 wrote to memory of 556 2684 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 34 PID 556 wrote to memory of 1220 556 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 35 PID 556 wrote to memory of 1220 556 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 35 PID 556 wrote to memory of 1220 556 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 35 PID 556 wrote to memory of 1220 556 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 35 PID 1220 wrote to memory of 2792 1220 cmd.exe 37 PID 1220 wrote to memory of 2792 1220 cmd.exe 37 PID 1220 wrote to memory of 2792 1220 cmd.exe 37 PID 1220 wrote to memory of 2792 1220 cmd.exe 37 PID 1220 wrote to memory of 1888 1220 cmd.exe 38 PID 1220 wrote to memory of 1888 1220 cmd.exe 38 PID 1220 wrote to memory of 1888 1220 cmd.exe 38 PID 1220 wrote to memory of 1888 1220 cmd.exe 38 PID 1220 wrote to memory of 2880 1220 cmd.exe 39 PID 1220 wrote to memory of 2880 1220 cmd.exe 39 PID 1220 wrote to memory of 2880 1220 cmd.exe 39 PID 1220 wrote to memory of 2880 1220 cmd.exe 39 PID 2880 wrote to memory of 2200 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 41 PID 2880 wrote to memory of 2200 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 41 PID 2880 wrote to memory of 2200 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 41 PID 2880 wrote to memory of 2200 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 41 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 2880 wrote to memory of 1776 2880 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 43 PID 1776 wrote to memory of 2328 1776 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 44 PID 1776 wrote to memory of 2328 1776 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 44 PID 1776 wrote to memory of 2328 1776 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 44 PID 1776 wrote to memory of 2328 1776 a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe 44 PID 2328 wrote to memory of 2468 2328 cmd.exe 46 PID 2328 wrote to memory of 2468 2328 cmd.exe 46 PID 2328 wrote to memory of 2468 2328 cmd.exe 46 PID 2328 wrote to memory of 2468 2328 cmd.exe 46 PID 2328 wrote to memory of 3024 2328 cmd.exe 47 PID 2328 wrote to memory of 3024 2328 cmd.exe 47 PID 2328 wrote to memory of 3024 2328 cmd.exe 47 PID 2328 wrote to memory of 3024 2328 cmd.exe 47 PID 2328 wrote to memory of 2136 2328 cmd.exe 48 PID 2328 wrote to memory of 2136 2328 cmd.exe 48 PID 2328 wrote to memory of 2136 2328 cmd.exe 48 PID 2328 wrote to memory of 2136 2328 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LmJmpmdSYXRV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F1D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4fdaWHcAalH0.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"4⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LmJmpmdSYXRV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9B84.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GXsKb70bzMh2.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"C:\Users\Admin\AppData\Local\Temp\a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Discovery
Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261B
MD576b2f2d4907cdec586bb7b53a95161de
SHA1892b2064d0f28f8fe6c76f0254bc1e069316bc5d
SHA2569495c95b1812b5376ba28aef25bd5664affed1bf4599631208f57f2a987b3c49
SHA512ee2542fc2d70ba6bd241052bdb74354d450d18f0cbd69e67f527d583924d66e8e869f55370f9446e7021ebcd6d2aed01edbc83524ba03975dc170dd58c4f399f
-
Filesize
261B
MD5c1426c863c0fe15570acb12a58fd9001
SHA16d4142d13d5315376f55520478db66262e6d0307
SHA25695d317638517c9fb21a5e333ed73a243973dfa3500df1c180262cbbe5c604d90
SHA512fbb28c0f5fbf6b89cfe305087de90a55b31056358b7bea75c59a891e1651934cedf37f40827b6a36cc2473540dc7998ceb6c78a34f177c89a3800968229c0ebc
-
Filesize
1KB
MD549c78333acaa56964d5f8792ad752409
SHA19c87acac42f34ef96fd304a4080a7d84334023ee
SHA25621a8cfa20a42699ea0aa96cd595aeda014e51585ff0cf287f069fa7c2426c330
SHA512434b869705f4b26309f44a662e803a091f87b0d810eeb2535ffcb0a462e6e77c314dff66d4bcfbab9d817202479062b22b2c36123c78fcf20faa47b20034f7d5