Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 17:06
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
33bb52dbc13cd018fbe3737e8893e8a1
-
SHA1
c5c01d977a107c50952dc0ae442e02d60e093cd5
-
SHA256
e79f1f7a293b811cf4de8077a3988c22a726204abdfb2866ba67500e53442f82
-
SHA512
12db6746fd74242cfd5c894b1ff4696b6504ee9af6afd1e0330f8f36228914fbe8b7d1aa4df2648fea37d2c879ab3e6972ae7fa2ea6120f8f0b29ea7132aee3b
-
SSDEEP
49152:3vbI22SsaNYfdPBldt698dBcjHIGynXvoGdafTHHB72eh2NT:3vk22SsaNYfdPBldt6+dBcjHIGyn/
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
Waix-40247.portmap.host:40247
Mutex
9d84e220-c4b7-4f5c-b179-163c03154a8f
Attributes
-
encryption_key
B963B2000CDCB4E83B2966F1E1C703720463EE18
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1764-1-0x00000000002B0000-0x00000000005D4000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1764 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1764 Client-built.exe