Malware Analysis Report

2025-04-14 04:54

Sample ID 241213-wdr56axqer
Target Client-built.exe
SHA256 91f3543e226fa4efa50011f09441cc3d6d49f14a77b38846ba80af8396e4b268
Tags
office04 quasar discovery spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

91f3543e226fa4efa50011f09441cc3d6d49f14a77b38846ba80af8396e4b268

Threat Level: Known bad

The file Client-built.exe was found to be: Known bad.

Malicious Activity Summary

office04 quasar discovery spyware trojan

Quasar RAT

Quasar family

Quasar payload

Checks computer location settings

Unsigned PE

System Network Configuration Discovery: Internet Connection Discovery

Enumerates physical storage devices

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Runs ping.exe

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-13 17:48

Signatures

Quasar family

quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-13 17:48

Reported

2024-12-13 17:51

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar family

quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A

Enumerates physical storage devices

System Network Configuration Discovery: Internet Connection Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3228 wrote to memory of 1556 N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe C:\Windows\system32\cmd.exe
PID 3228 wrote to memory of 1556 N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe C:\Windows\system32\cmd.exe
PID 1556 wrote to memory of 3748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\chcp.com
PID 1556 wrote to memory of 3748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\chcp.com
PID 1556 wrote to memory of 1952 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 1556 wrote to memory of 1952 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\Client-built.exe

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LBHuD4As7BaK.bat" "

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\PING.EXE

ping -n 10 localhost

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 Waix-40247.portmap.host udp
DE 193.161.193.99:40247 Waix-40247.portmap.host tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 ipwho.is udp
DE 195.201.57.90:443 ipwho.is tcp
US 8.8.8.8:53 99.193.161.193.in-addr.arpa udp
US 8.8.8.8:53 90.57.201.195.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 92.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 181.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp

Files

memory/3228-0-0x00007FFFA5FC3000-0x00007FFFA5FC5000-memory.dmp

memory/3228-1-0x00000000003D0000-0x00000000006F4000-memory.dmp

memory/3228-2-0x00007FFFA5FC0000-0x00007FFFA6A81000-memory.dmp

memory/3228-3-0x000000001BDF0000-0x000000001BE40000-memory.dmp

memory/3228-4-0x000000001BF00000-0x000000001BFB2000-memory.dmp

memory/3228-7-0x000000001BE40000-0x000000001BE52000-memory.dmp

memory/3228-8-0x000000001BEA0000-0x000000001BEDC000-memory.dmp

memory/3228-9-0x00007FFFA5FC3000-0x00007FFFA5FC5000-memory.dmp

memory/3228-10-0x00007FFFA5FC0000-0x00007FFFA6A81000-memory.dmp

memory/3228-15-0x00007FFFA5FC0000-0x00007FFFA6A81000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\LBHuD4As7BaK.bat

MD5 40dfdcb8f28b5788a3fde3eacf080925
SHA1 ca4ad2e5f582d46c61d13ed81bd2bd0c097d04c7
SHA256 ac43cbae2e16b7d0a623d2c5af0fa4d27a05aa68c5fb29fd1ad693326d170c2c
SHA512 163a349bd3a6d70f97619de9fa2d56ae256c9c09003028b1525c3d2ff3820e931b5e25a11e4c74d258baf5ff557ca83df3f54c198ab30f0812e1378f40707b50