Resubmissions

14-12-2024 20:40

241214-zftzbatmds 10

14-12-2024 20:38

241214-zezs6svpgq 10

Analysis

  • max time kernel
    136s
  • max time network
    105s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-12-2024 20:40

General

  • Target

    Quasar v1.4.1/Quasar.exe

  • Size

    1.2MB

  • MD5

    12ebf922aa80d13f8887e4c8c5e7be83

  • SHA1

    7f87a80513e13efd45175e8f2511c2cd17ff51e8

  • SHA256

    43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

  • SHA512

    fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

  • SSDEEP

    12288:IwPs012cBBBYiL9l/bFfpBBBBBBBBBBBBcA:jBBBYiLvzFfpBBBBBBBBBBBBcA

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 56 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe
    "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" /select, "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12"
      2⤵
        PID:3520
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3348
      • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe
        "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe"
        2⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3800
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4664

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

        Filesize

        14KB

        MD5

        7717dde075fe5900ea047c41fa5f1c2b

        SHA1

        2d33681e8b9169799f48aed4e3ffb52c45a7517c

        SHA256

        4880b5d483d7cd330ee223e2c24d8cd3e0b8aa44410865fab4e9e799dd90c309

        SHA512

        9de198bfa22f4959d0e1932d60a4760a743179350cf6cfdeb7b3976e5f6bc1f606d04ab13b726e4e4451f4818404e6041d7f7939ea045bb19911f5592c9d5789

      • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12

        Filesize

        4KB

        MD5

        6f298d20ff01f2fbd4eac046c4897690

        SHA1

        ffb7fa653b23fd5b37b25981fe2e97a273a898fd

        SHA256

        a4690b0a9c9b02fa5a649b271fa1ec51703ce7eff4983380b320705006fd5386

        SHA512

        ea269661bf298f78fa2daff926d3046742d358698c47b7b9e765cf469fc0e53d19af265358fc253532a7cabb46f0407ee763e8ba5121442f3435a57e528b8c33

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-556537508-2730415644-482548075-1000\d82017f0f2bbc74c4b4c30b759cef3f9_dd844bc0-09d5-4996-aa38-4ceeb7107a86

        Filesize

        3KB

        MD5

        e2f635c869008165de2e434225e245ca

        SHA1

        615c738a814e4c2c4124a6b9d5c8f0ddab6cd787

        SHA256

        189daa1bffc8716e050229a27837a95133c5a3ef1f2e3ba7383db0e2c5d639b2

        SHA512

        96448116f7bd79b72a099d9c0fe46b7eee24f627f93b90cfdeef1651c1beb40ca73f3e5dd5da414854f1536c637822081baa4486eac3475da9e4de6f4b166067

      • memory/2068-4-0x00007FFDA3DE0000-0x00007FFDA48A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2068-13-0x00007FFDA3DE0000-0x00007FFDA48A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2068-5-0x00007FFDA3DE0000-0x00007FFDA48A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2068-6-0x00007FFDA3DE0000-0x00007FFDA48A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2068-7-0x000001C8ED1D0000-0x000001C8ED4FE000-memory.dmp

        Filesize

        3.2MB

      • memory/2068-8-0x00007FFDA3DE3000-0x00007FFDA3DE5000-memory.dmp

        Filesize

        8KB

      • memory/2068-12-0x00007FFDA3DE0000-0x00007FFDA48A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2068-0-0x00007FFDA3DE3000-0x00007FFDA3DE5000-memory.dmp

        Filesize

        8KB

      • memory/2068-14-0x00007FFDA3DE0000-0x00007FFDA48A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2068-3-0x00007FFDA3DE0000-0x00007FFDA48A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2068-31-0x000001C8ECDF0000-0x000001C8ECE08000-memory.dmp

        Filesize

        96KB

      • memory/2068-32-0x000001C8EEA50000-0x000001C8EEAA0000-memory.dmp

        Filesize

        320KB

      • memory/2068-33-0x000001C8EEB60000-0x000001C8EEC12000-memory.dmp

        Filesize

        712KB

      • memory/2068-34-0x000001C8EEAA0000-0x000001C8EEAEC000-memory.dmp

        Filesize

        304KB

      • memory/2068-2-0x000001C8E86C0000-0x000001C8E86D6000-memory.dmp

        Filesize

        88KB

      • memory/2068-1-0x000001C8E8140000-0x000001C8E8278000-memory.dmp

        Filesize

        1.2MB