Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 06:19
Behavioral task
behavioral1
Sample
40454ebeae15007866e7e1557bbf362de47d2ae7fc758f948be650b4dfcb6d5bN.exe
Resource
win7-20240729-en
windows7-x64
4 signatures
120 seconds
General
-
Target
40454ebeae15007866e7e1557bbf362de47d2ae7fc758f948be650b4dfcb6d5bN.exe
-
Size
145KB
-
MD5
3c4ea51060131869cedcac5c684c36a0
-
SHA1
287ab20bf873d1a88d4865020a1f48805a32a409
-
SHA256
40454ebeae15007866e7e1557bbf362de47d2ae7fc758f948be650b4dfcb6d5b
-
SHA512
26ea69581edaf089b3e8893f1a1f4eb6708409028728a8bff3665e9fbf2555f205fbdf0d6549a91095ccb22d66b9ab53c877a3f604407d8928fff9f987eb5046
-
SSDEEP
3072:sUltFC1Q0nEexBx32E4Hi+edyBCrsRZpbalHbS1IB:cnEex732egRZpbaP
Malware Config
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2172-1-0x0000000001090000-0x00000000010BA000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 40454ebeae15007866e7e1557bbf362de47d2ae7fc758f948be650b4dfcb6d5bN.exe