Analysis
-
max time kernel
14s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 22:45
Behavioral task
behavioral1
Sample
Quasar.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
Quasar.exe
-
Size
1.2MB
-
MD5
12ebf922aa80d13f8887e4c8c5e7be83
-
SHA1
7f87a80513e13efd45175e8f2511c2cd17ff51e8
-
SHA256
43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e
-
SHA512
fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275
-
SSDEEP
12288:IwPs012cBBBYiL9l/bFfpBBBBBBBBBBBBcA:jBBBYiLvzFfpBBBBBBBBBBBBcA
Malware Config
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4004-1-0x0000023299EE0000-0x000002329A018000-memory.dmp family_quasar -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4004 Quasar.exe Token: SeDebugPrivilege 1360 taskmgr.exe Token: SeSystemProfilePrivilege 1360 taskmgr.exe Token: SeCreateGlobalPrivilege 1360 taskmgr.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quasar.exe"C:\Users\Admin\AppData\Local\Temp\Quasar.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1360