Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 21:41
Behavioral task
behavioral1
Sample
CollosalLoader.exe
Resource
win7-20240903-en
General
-
Target
CollosalLoader.exe
-
Size
3.4MB
-
MD5
8c38855e8217b6e6ba9726e9eb2e6dbc
-
SHA1
dd39141900c816d4afe09492076dd32f7a66053d
-
SHA256
7d74f4b82a1de0e876f2db74e9c0e306845c43b91282a8131999813b1704e8db
-
SHA512
2017b7baee3bca4462fe8f54de139c577342a4e615808ab37e486662b52d5a7062203dc99648cdfa9fa7fca004e4d557ca0c7971069c11a28bfe430042513784
-
SSDEEP
49152:XvDlL26AaNeWgPhlmVqvMQ7XSK0Nmf4ar27oGd9FeTHHB72eh2NT:Xv5L26AaNeWgPhlmVqkQ7XSKSmfA
Malware Config
Extracted
quasar
1.4.1
CLSLMW3
Fluxii-52940.portmap.host:52940
94dacbda-c52c-4bca-bb33-6083baee5fc3
-
encryption_key
FB0CEB9B14FB83E904EF6654FB1D7D8D8D43358F
-
install_name
CollosalLoader.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Win32
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2792-1-0x00000000001C0000-0x0000000000526000-memory.dmp family_quasar behavioral1/files/0x0008000000014b28-5.dat family_quasar behavioral1/memory/2756-9-0x00000000001F0000-0x0000000000556000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2756 CollosalLoader.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe 2468 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2792 CollosalLoader.exe Token: SeDebugPrivilege 2756 CollosalLoader.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 CollosalLoader.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2600 2792 CollosalLoader.exe 28 PID 2792 wrote to memory of 2600 2792 CollosalLoader.exe 28 PID 2792 wrote to memory of 2600 2792 CollosalLoader.exe 28 PID 2792 wrote to memory of 2756 2792 CollosalLoader.exe 30 PID 2792 wrote to memory of 2756 2792 CollosalLoader.exe 30 PID 2792 wrote to memory of 2756 2792 CollosalLoader.exe 30 PID 2756 wrote to memory of 2468 2756 CollosalLoader.exe 31 PID 2756 wrote to memory of 2468 2756 CollosalLoader.exe 31 PID 2756 wrote to memory of 2468 2756 CollosalLoader.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CollosalLoader.exe"C:\Users\Admin\AppData\Local\Temp\CollosalLoader.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Win32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\CollosalLoader.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Users\Admin\AppData\Roaming\SubDir\CollosalLoader.exe"C:\Users\Admin\AppData\Roaming\SubDir\CollosalLoader.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Win32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\CollosalLoader.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD58c38855e8217b6e6ba9726e9eb2e6dbc
SHA1dd39141900c816d4afe09492076dd32f7a66053d
SHA2567d74f4b82a1de0e876f2db74e9c0e306845c43b91282a8131999813b1704e8db
SHA5122017b7baee3bca4462fe8f54de139c577342a4e615808ab37e486662b52d5a7062203dc99648cdfa9fa7fca004e4d557ca0c7971069c11a28bfe430042513784