Analysis

  • max time kernel
    43s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 09:11

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    d1f13629773443d07acf921fbba38982

  • SHA1

    3cbd73a94e55487e683cac99297fd98a0570f1ca

  • SHA256

    8efce1455cb1ecf70efd19472b9215663687fd94cc16f6eac07592d27cf82ce1

  • SHA512

    3f0378c2407a8630d9b2a92015b41e450af2e7ae5a99b5d204005312f7d97a193e4c8a2796adb5a281f14a935893158820552952fe3c8e489a1de438fcd0f747

  • SSDEEP

    49152:fvqlL26AaNeWgPhlmVqvMQ7XSKfdRJ68bR3LoGdTKTHHB72eh2NT:fvSL26AaNeWgPhlmVqkQ7XSKfdRJ6G

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.39:4782

Mutex

3b241461-adb5-459a-81b3-0e7413c3b174

Attributes
  • encryption_key

    7928B7E8CF671D0E7D6DF9547E85C7460DB50B8D

  • install_name

    fortnite1.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\fortnite1.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2800
    • C:\Users\Admin\AppData\Roaming\SubDir\fortnite1.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\fortnite1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\fortnite1.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2632
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7feef4a9758,0x7feef4a9768,0x7feef4a9778
      2⤵
        PID:2816
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:2
        2⤵
          PID:352
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:8
          2⤵
            PID:2524
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:8
            2⤵
              PID:1432
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:1
              2⤵
                PID:1788
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:1
                2⤵
                  PID:1316
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1524 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:2
                  2⤵
                    PID:448
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1364 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:1
                    2⤵
                      PID:344
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:8
                      2⤵
                        PID:896
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3700 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:1
                        2⤵
                          PID:1968
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=700 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:1
                          2⤵
                            PID:1660
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2104 --field-trial-handle=1360,i,14774820442569267716,4260153440396446429,131072 /prefetch:1
                            2⤵
                              PID:1000
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:1900

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                              Filesize

                              215KB

                              MD5

                              2be38925751dc3580e84c3af3a87f98d

                              SHA1

                              8a390d24e6588bef5da1d3db713784c11ca58921

                              SHA256

                              1412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b

                              SHA512

                              1341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002

                              Filesize

                              41KB

                              MD5

                              e319c7af7370ac080fbc66374603ed3a

                              SHA1

                              4f0cd3c48c2e82a167384d967c210bdacc6904f9

                              SHA256

                              5ad4c276af3ac5349ee9280f8a8144a30d33217542e065864c8b424a08365132

                              SHA512

                              4681a68a428e15d09010e2b2edba61e22808da1b77856f3ff842ebd022a1b801dfbb7cbb2eb8c1b6c39ae397d20892a3b7af054650f2899d0d16fc12d3d1a011

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              144B

                              MD5

                              33e486820a0e993dd6a5d3fa9206aa02

                              SHA1

                              c2c7d0a8bbac4497a8a8838f44298449f24cc2e1

                              SHA256

                              b0c0f86ea7de589e274006bacdcc2e94d50b5715b0db0d6f4b459b9c0b0de588

                              SHA512

                              458d04e29bd85aa10ea28a3605d3e03d5a33fda68aa2c36f52264a311bff1a0fed1f51921c10e7b8690fc0d312ce14d3be4263cf2a8ff127af5981a87e79d22a

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                              Filesize

                              16B

                              MD5

                              aefd77f47fb84fae5ea194496b44c67a

                              SHA1

                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                              SHA256

                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                              SHA512

                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              62da9f6dc38e37f508449b343784269a

                              SHA1

                              5e429b2888464303e9fe6ec746da8f1b7d36df74

                              SHA256

                              8f56b10eedc3dbc69633cd43258942ef3d8f3481dd1586909df38774b1230500

                              SHA512

                              2d11f328be8b61a0b5e823e50f8ee2ae35e261728fa45b492d40b851ee1ad8e77988fec5474d537a25fae380bb558317dd60054e0b58fe154e450cdb97d96bca

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              361B

                              MD5

                              10477ba2490c0e13240a8b408f6315b8

                              SHA1

                              db85a3f6d1424c5cb59022dbfb5055f3dc1a2934

                              SHA256

                              3ef0417513cdaa62de3c0e3c3bdb8822654536c4e7f73577932785640548b4af

                              SHA512

                              320b13c8a14d029ab6733f4593e90199bee2fd11ddceb3cec13ea7c63a6fe4a3b6d9c1d6a7b18606184264c07ca8f6c1c86f445ab6d71374bf493389221b8617

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              361B

                              MD5

                              3f42426930edf5db9d446a78e5a7ff46

                              SHA1

                              297ce3fde2ecc7280beed3e7c3a567753cf07b07

                              SHA256

                              4711dfacca83edf74264033cb07b714771c6cd728a030ac930c972eb78644ba8

                              SHA512

                              28f26ab4b4d24f1130e37f809adc413f5ed242aed8eb6181a22f3a1629dc0bcacf8493672cf8a332ad803baa4b36d0cc6c60f8f07a6097a4cdaa5cbb9d8542e0

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              c03dec794996098ef1e7c6b4b71e8871

                              SHA1

                              1fce10632c830ab4e86342605890141f8f083240

                              SHA256

                              b913fe1cb121e3bab2ac841a810f03289be58739e9a0fc4ea2baca3ac525ad99

                              SHA512

                              1db08c7506bb38e27daa116846858969d4445efa9d6922707ae45a7ce33a9568c5afee797730687215dedbd56135b0f821a8848aeb6992f7ea7310637f9954f9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              15ae3f63e501d458a478b11210811309

                              SHA1

                              a570224cdc79dd601f2e61e596343e4615c2e424

                              SHA256

                              1c7d4b7dd0b4cf505f6933463283022c19b750ace4628b8ea17602975359a498

                              SHA512

                              65f6f40d1df2e13de7ab215ca221800ca37aa4c6ba790931766e29a70b03c73d62b17e2bc8d968d389ca0f612b4f78da9f2413139aca9c1db6a1056c330b25d9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              6771ce3e4eb1b66d0f6075b369c134dc

                              SHA1

                              1ebe925a6dd4d0b9d423eca8df03709c6f97054c

                              SHA256

                              d2af435b14c126c5f4ffb353650038f797f81c25651a35d98559317e4d19ac55

                              SHA512

                              1421a33008be91c86b44519ac3d4a7e982ad6ede28cf0712169200d31027fa1430836ecdce50c416f7cc6a546ed28d8f5fb1ff1beed433de5530b6732d4e5679

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              c6357072847cd6706d8905ce464618cf

                              SHA1

                              08af3927db2d081ea8b21cc8c34bc7ca351e5350

                              SHA256

                              e84d885f76271e83c09bb152014720245b85a7e1776750c0666409e80264b0a5

                              SHA512

                              c9fe1502109bc4a0bc9a00d06e80df48272c6a618c4c0f02775b27ed3ce5aa056041ad3039efddcfc4be072bb33c76a3c0ceeb450377d4ea5a62d7d8b129f1e9

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                              Filesize

                              16B

                              MD5

                              18e723571b00fb1694a3bad6c78e4054

                              SHA1

                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                              SHA256

                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                              SHA512

                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              347KB

                              MD5

                              e8040bc45e45bd8d4ad5949c49fc7c1d

                              SHA1

                              ca2c7ffd5c18bdca4c4bb6c06571ca4dfeb18328

                              SHA256

                              af6dbf08e66178b5b31c497c476121feb6be12c194fa11a8f7e890ff29b74f3e

                              SHA512

                              34b593c3054f073ba8e288d596a2ad87ca2ec4a87a672302aeae09b652366609ef1be09480c3bfb5f97770620fed52ae0a81c6a04858c74a3da205d618006da7

                            • C:\Users\Admin\AppData\Roaming\SubDir\fortnite1.exe

                              Filesize

                              3.1MB

                              MD5

                              d1f13629773443d07acf921fbba38982

                              SHA1

                              3cbd73a94e55487e683cac99297fd98a0570f1ca

                              SHA256

                              8efce1455cb1ecf70efd19472b9215663687fd94cc16f6eac07592d27cf82ce1

                              SHA512

                              3f0378c2407a8630d9b2a92015b41e450af2e7ae5a99b5d204005312f7d97a193e4c8a2796adb5a281f14a935893158820552952fe3c8e489a1de438fcd0f747

                            • \??\pipe\crashpad_2768_CQLTQFKAJXEYFTPM

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/2232-0-0x000007FEF5443000-0x000007FEF5444000-memory.dmp

                              Filesize

                              4KB

                            • memory/2232-2-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2232-8-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/2232-1-0x00000000001E0000-0x0000000000504000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3040-66-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/3040-10-0x0000000000040000-0x0000000000364000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/3040-11-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

                              Filesize

                              9.9MB

                            • memory/3040-9-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

                              Filesize

                              9.9MB