Analysis Overview
SHA256
5a3b284cfc49a72f3a28b91aad715c0181c13c10672433323569e92f15afa0c1
Threat Level: Known bad
The file IMVUDineroIlimitado.exe was found to be: Known bad.
Malicious Activity Summary
Quasar payload
Quasar RAT
Quasar family
Executes dropped EXE
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Scheduled Task/Job: Scheduled Task
Suspicious use of SetWindowsHookEx
Uses Task Scheduler COM API
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-12-13 06:56
Signatures
Quasar family
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-12-13 06:56
Reported
2024-12-13 06:58
Platform
win7-20241023-en
Max time kernel
148s
Max time network
150s
Command Line
Signatures
Quasar RAT
Quasar family
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\system32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe
"C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe"
C:\Windows\system32\schtasks.exe
"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe
"C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"
C:\Windows\system32\schtasks.exe
"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | azxq0ap.localto.net | udp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
Files
memory/2396-0-0x000007FEF5EB3000-0x000007FEF5EB4000-memory.dmp
memory/2396-1-0x00000000001E0000-0x0000000000532000-memory.dmp
memory/2396-2-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe
| MD5 | 507321e95801a8d7833c15613d60fa6f |
| SHA1 | b5805546dbdff837b9a0f6c6e619ef660bb23b97 |
| SHA256 | 5a3b284cfc49a72f3a28b91aad715c0181c13c10672433323569e92f15afa0c1 |
| SHA512 | bd3edf014ed1aed2aac6331307c07997dba8a5fe631cb1209eea7a3f72deb7901cc8175b73832142c9552a510f0e9d9d2cbf65008c961c4e26e992daab4c1dba |
memory/2396-8-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp
memory/2232-10-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp
memory/2232-9-0x0000000001110000-0x0000000001462000-memory.dmp
memory/2232-11-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp
memory/2232-12-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-12-13 06:56
Reported
2024-12-13 06:58
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Quasar RAT
Quasar family
Quasar payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | N/A |
Scheduled Task/Job: Scheduled Task
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\schtasks.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2812 wrote to memory of 3888 | N/A | C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe | C:\Windows\SYSTEM32\schtasks.exe |
| PID 2812 wrote to memory of 3888 | N/A | C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe | C:\Windows\SYSTEM32\schtasks.exe |
| PID 2812 wrote to memory of 1716 | N/A | C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe |
| PID 2812 wrote to memory of 1716 | N/A | C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe |
| PID 1716 wrote to memory of 3748 | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | C:\Windows\SYSTEM32\schtasks.exe |
| PID 1716 wrote to memory of 3748 | N/A | C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe | C:\Windows\SYSTEM32\schtasks.exe |
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe
"C:\Users\Admin\AppData\Local\Temp\IMVUDineroIlimitado.exe"
C:\Windows\SYSTEM32\schtasks.exe
"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe
"C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"
C:\Windows\SYSTEM32\schtasks.exe
"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.129.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | azxq0ap.localto.net | udp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.130.81.91.in-addr.arpa | udp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 8.8.8.8:53 | 41.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.243.111.52.in-addr.arpa | udp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 23.158.232.33:3425 | azxq0ap.localto.net | tcp |
| US | 8.8.8.8:53 | udp |
Files
memory/2812-0-0x00007FF867A23000-0x00007FF867A25000-memory.dmp
memory/2812-1-0x0000000000340000-0x0000000000692000-memory.dmp
memory/2812-2-0x00007FF867A20000-0x00007FF8684E1000-memory.dmp
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe
| MD5 | 507321e95801a8d7833c15613d60fa6f |
| SHA1 | b5805546dbdff837b9a0f6c6e619ef660bb23b97 |
| SHA256 | 5a3b284cfc49a72f3a28b91aad715c0181c13c10672433323569e92f15afa0c1 |
| SHA512 | bd3edf014ed1aed2aac6331307c07997dba8a5fe631cb1209eea7a3f72deb7901cc8175b73832142c9552a510f0e9d9d2cbf65008c961c4e26e992daab4c1dba |
memory/2812-9-0x00007FF867A20000-0x00007FF8684E1000-memory.dmp
memory/1716-10-0x00007FF867A20000-0x00007FF8684E1000-memory.dmp
memory/1716-11-0x00007FF867A20000-0x00007FF8684E1000-memory.dmp
memory/1716-12-0x00000000035A0000-0x00000000035F0000-memory.dmp
memory/1716-13-0x000000001C7A0000-0x000000001C852000-memory.dmp
memory/1716-14-0x00007FF867A20000-0x00007FF8684E1000-memory.dmp