Analysis
-
max time kernel
33s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 19:43
General
-
Target
phantomX loader.exe
-
Size
3.3MB
-
MD5
8ac22fce32688203c5857e972a48c47c
-
SHA1
6808d49fe912bfe43b2d4fb6456c7da51fff9f5a
-
SHA256
9a822779bda311ccef9b3d2f88a75ebeb2f5113d2b45d5ed7a0d25a35c3fd8e5
-
SHA512
968f1d55159e59b753583eb88627ca0d392f92a753154633f95ef598aca32fa1e134aa5b7d7c42007fbfcca1fa74f084a19f2856b5b341a7a205601e957aba34
-
SSDEEP
98304:lv+L26AaNeWgPhlmVqkQ7XSK4Sk8/eFb:J+4Sf8G
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.48:4782
33376e96-8fb8-4154-bd0a-fd0f58f69afe
-
encryption_key
9DE7C466D5C89B4DCD53772026AFA9FDFA35108F
-
install_name
phantomX injector.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/2672-1-0x0000000000A00000-0x0000000000D5E000-memory.dmp family_quasar behavioral1/files/0x000a000000023b8c-5.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 668 phantomX injector.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\SubDir\phantomX injector.exe phantomX loader.exe File opened for modification C:\Windows\system32\SubDir\phantomX injector.exe phantomX loader.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2672 phantomX loader.exe Token: SeDebugPrivilege 668 phantomX injector.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 668 phantomX injector.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 668 phantomX injector.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2672 wrote to memory of 668 2672 phantomX loader.exe 83 PID 2672 wrote to memory of 668 2672 phantomX loader.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\phantomX loader.exe"C:\Users\Admin\AppData\Local\Temp\phantomX loader.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\SubDir\phantomX injector.exe"C:\Windows\system32\SubDir\phantomX injector.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD58ac22fce32688203c5857e972a48c47c
SHA16808d49fe912bfe43b2d4fb6456c7da51fff9f5a
SHA2569a822779bda311ccef9b3d2f88a75ebeb2f5113d2b45d5ed7a0d25a35c3fd8e5
SHA512968f1d55159e59b753583eb88627ca0d392f92a753154633f95ef598aca32fa1e134aa5b7d7c42007fbfcca1fa74f084a19f2856b5b341a7a205601e957aba34