Analysis

  • max time kernel
    82s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 17:04

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    33bb52dbc13cd018fbe3737e8893e8a1

  • SHA1

    c5c01d977a107c50952dc0ae442e02d60e093cd5

  • SHA256

    e79f1f7a293b811cf4de8077a3988c22a726204abdfb2866ba67500e53442f82

  • SHA512

    12db6746fd74242cfd5c894b1ff4696b6504ee9af6afd1e0330f8f36228914fbe8b7d1aa4df2648fea37d2c879ab3e6972ae7fa2ea6120f8f0b29ea7132aee3b

  • SSDEEP

    49152:3vbI22SsaNYfdPBldt698dBcjHIGynXvoGdafTHHB72eh2NT:3vk22SsaNYfdPBldt6+dBcjHIGyn/

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

Waix-40247.portmap.host:40247

Mutex

9d84e220-c4b7-4f5c-b179-163c03154a8f

Attributes
  • encryption_key

    B963B2000CDCB4E83B2966F1E1C703720463EE18

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Users\Admin\AppData\Local\Temp\q18VqYZrcfjP.exe
      "C:\Users\Admin\AppData\Local\Temp\q18VqYZrcfjP.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2724
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\q18VqYZrcfjP.exe

    Filesize

    1.9MB

    MD5

    6ae8e963b33ee52df761412b451b2962

    SHA1

    f7ab1987848a91af2c77a72583211dcadeed420a

    SHA256

    f59056339de56820e57c961d6ddd9032bd78af9f2333797944f4ee57b77ee2ca

    SHA512

    472f07bb37966d056d9efb97e4b686951987ca358a9f213fa6db5ec50cf4a32084cb18c863c8c1add20a2619154cf9f4705541e27c196142917eb9491b54846a

  • memory/4208-0-0x00007FFD31403000-0x00007FFD31405000-memory.dmp

    Filesize

    8KB

  • memory/4208-1-0x0000000000680000-0x00000000009A4000-memory.dmp

    Filesize

    3.1MB

  • memory/4208-2-0x00007FFD31400000-0x00007FFD31EC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4208-3-0x000000001C0A0000-0x000000001C0F0000-memory.dmp

    Filesize

    320KB

  • memory/4208-4-0x000000001C1B0000-0x000000001C262000-memory.dmp

    Filesize

    712KB

  • memory/4208-5-0x00007FFD31403000-0x00007FFD31405000-memory.dmp

    Filesize

    8KB

  • memory/4208-6-0x00007FFD31400000-0x00007FFD31EC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4208-9-0x000000001C0F0000-0x000000001C102000-memory.dmp

    Filesize

    72KB

  • memory/4208-10-0x000000001C150000-0x000000001C18C000-memory.dmp

    Filesize

    240KB

  • memory/4492-61-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-60-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-59-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-71-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-70-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-69-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-68-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-67-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-66-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB

  • memory/4492-65-0x000002A2521A0000-0x000002A2521A1000-memory.dmp

    Filesize

    4KB