Analysis
-
max time kernel
91s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
06201f911b2f736433fac73c68b2194a.exe
Resource
win7-20240903-en
General
-
Target
06201f911b2f736433fac73c68b2194a.exe
-
Size
4.8MB
-
MD5
06201f911b2f736433fac73c68b2194a
-
SHA1
4d7221f72b4b541bb7efb2a36cac419391d532ed
-
SHA256
01349efa40959e8c4653c93da14f7b11c0a6fbe54894d998970abd46ca701d6e
-
SHA512
461604e159a010cb97d39ad683aab654d4c56512c2d437f9adcaa7f51a032aec880f0c9641ede195eefb80333d0f4f329e77352856d37b0c34107965535a6b43
-
SSDEEP
49152:DTvC/MTQYxsWR7a522meghLwOqxEs08Y6m2ZyoblJP6fa:HjTQYxsWRimeghLwPx6GZyobHP
Malware Config
Extracted
quasar
1.4.1
1606
pixels.game-server.cc:1606
6d96d222-8b64-4e23-a33e-b2753466d47c
-
encryption_key
0D9465E10679C48F6CD017D507EF5A31654D1928
-
install_name
Client.exe
-
log_directory
wLogs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3080-21-0x0000000000CC0000-0x0000000000FE4000-memory.dmp family_quasar -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
06201f911b2f736433fac73c68b2194a.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06201f911b2f736433fac73c68b2194a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
06201f911b2f736433fac73c68b2194a.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 06201f911b2f736433fac73c68b2194a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
06201f911b2f736433fac73c68b2194a.exedescription pid Process procid_target PID 2680 set thread context of 3080 2680 06201f911b2f736433fac73c68b2194a.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
06201f911b2f736433fac73c68b2194a.execsc.exeCmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06201f911b2f736433fac73c68b2194a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmd.exe -
NTFS ADS 2 IoCs
Processes:
06201f911b2f736433fac73c68b2194a.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\CIMV2 06201f911b2f736433fac73c68b2194a.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\root\cimv2 06201f911b2f736433fac73c68b2194a.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
06201f911b2f736433fac73c68b2194a.exepid Process 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
06201f911b2f736433fac73c68b2194a.exepid Process 2680 06201f911b2f736433fac73c68b2194a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
csc.exedescription pid Process Token: SeDebugPrivilege 3080 csc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
06201f911b2f736433fac73c68b2194a.exepid Process 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
06201f911b2f736433fac73c68b2194a.exepid Process 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe 2680 06201f911b2f736433fac73c68b2194a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
csc.exepid Process 3080 csc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
06201f911b2f736433fac73c68b2194a.exedescription pid Process procid_target PID 2680 wrote to memory of 3080 2680 06201f911b2f736433fac73c68b2194a.exe 94 PID 2680 wrote to memory of 3080 2680 06201f911b2f736433fac73c68b2194a.exe 94 PID 2680 wrote to memory of 3080 2680 06201f911b2f736433fac73c68b2194a.exe 94 PID 2680 wrote to memory of 3080 2680 06201f911b2f736433fac73c68b2194a.exe 94 PID 2680 wrote to memory of 3080 2680 06201f911b2f736433fac73c68b2194a.exe 94 PID 2680 wrote to memory of 4856 2680 06201f911b2f736433fac73c68b2194a.exe 95 PID 2680 wrote to memory of 4856 2680 06201f911b2f736433fac73c68b2194a.exe 95 PID 2680 wrote to memory of 4856 2680 06201f911b2f736433fac73c68b2194a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\06201f911b2f736433fac73c68b2194a.exe"C:\Users\Admin\AppData\Local\Temp\06201f911b2f736433fac73c68b2194a.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
C:\Windows\SysWOW64\Cmd.exe"C:\Windows\SysWOW64\Cmd.exe" 30802⤵
- System Location Discovery: System Language Discovery
PID:4856
-