Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
06201f911b2f736433fac73c68b2194a.exe
Resource
win7-20240903-en
General
-
Target
06201f911b2f736433fac73c68b2194a.exe
-
Size
4.8MB
-
MD5
06201f911b2f736433fac73c68b2194a
-
SHA1
4d7221f72b4b541bb7efb2a36cac419391d532ed
-
SHA256
01349efa40959e8c4653c93da14f7b11c0a6fbe54894d998970abd46ca701d6e
-
SHA512
461604e159a010cb97d39ad683aab654d4c56512c2d437f9adcaa7f51a032aec880f0c9641ede195eefb80333d0f4f329e77352856d37b0c34107965535a6b43
-
SSDEEP
49152:DTvC/MTQYxsWR7a522meghLwOqxEs08Y6m2ZyoblJP6fa:HjTQYxsWRimeghLwPx6GZyobHP
Malware Config
Extracted
quasar
1.4.1
1606
pixels.game-server.cc:1606
6d96d222-8b64-4e23-a33e-b2753466d47c
-
encryption_key
0D9465E10679C48F6CD017D507EF5A31654D1928
-
install_name
Client.exe
-
log_directory
wLogs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2624-33-0x0000000000370000-0x0000000000694000-memory.dmp family_quasar behavioral1/memory/2624-35-0x0000000000370000-0x0000000000694000-memory.dmp family_quasar behavioral1/memory/2624-31-0x0000000000370000-0x0000000000694000-memory.dmp family_quasar -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06201f911b2f736433fac73c68b2194a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 2624 2536 06201f911b2f736433fac73c68b2194a.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06201f911b2f736433fac73c68b2194a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmd.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\cimv2 06201f911b2f736433fac73c68b2194a.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\CIMV2 06201f911b2f736433fac73c68b2194a.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2536 06201f911b2f736433fac73c68b2194a.exe 2536 06201f911b2f736433fac73c68b2194a.exe 2536 06201f911b2f736433fac73c68b2194a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 06201f911b2f736433fac73c68b2194a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2624 csc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2536 06201f911b2f736433fac73c68b2194a.exe 2536 06201f911b2f736433fac73c68b2194a.exe 2536 06201f911b2f736433fac73c68b2194a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2536 06201f911b2f736433fac73c68b2194a.exe 2536 06201f911b2f736433fac73c68b2194a.exe 2536 06201f911b2f736433fac73c68b2194a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 csc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2624 2536 06201f911b2f736433fac73c68b2194a.exe 33 PID 2536 wrote to memory of 2624 2536 06201f911b2f736433fac73c68b2194a.exe 33 PID 2536 wrote to memory of 2624 2536 06201f911b2f736433fac73c68b2194a.exe 33 PID 2536 wrote to memory of 2624 2536 06201f911b2f736433fac73c68b2194a.exe 33 PID 2536 wrote to memory of 2624 2536 06201f911b2f736433fac73c68b2194a.exe 33 PID 2536 wrote to memory of 2624 2536 06201f911b2f736433fac73c68b2194a.exe 33 PID 2536 wrote to memory of 2900 2536 06201f911b2f736433fac73c68b2194a.exe 34 PID 2536 wrote to memory of 2900 2536 06201f911b2f736433fac73c68b2194a.exe 34 PID 2536 wrote to memory of 2900 2536 06201f911b2f736433fac73c68b2194a.exe 34 PID 2536 wrote to memory of 2900 2536 06201f911b2f736433fac73c68b2194a.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\06201f911b2f736433fac73c68b2194a.exe"C:\Users\Admin\AppData\Local\Temp\06201f911b2f736433fac73c68b2194a.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\Cmd.exe"C:\Windows\SysWOW64\Cmd.exe" 26242⤵
- System Location Discovery: System Language Discovery
PID:2900
-