Analysis

  • max time kernel
    43s
  • max time network
    23s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-12-2024 15:19

General

  • Target

    https://dosya.co/pfx975p1upf8/Quasar.v1.4.1.zip.html

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • A potential corporate email address has been identified in the URL: [email protected]
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 50 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://dosya.co/pfx975p1upf8/Quasar.v1.4.1.zip.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff846df3cb8,0x7ff846df3cc8,0x7ff846df3cd8
      2⤵
        PID:3432
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:2
        2⤵
          PID:1812
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4744
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
          2⤵
            PID:1700
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
            2⤵
              PID:2488
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
              2⤵
                PID:2668
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:1
                2⤵
                  PID:2080
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1260
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:1
                  2⤵
                    PID:1088
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:8
                    2⤵
                    • NTFS ADS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4932
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                    2⤵
                      PID:3340
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,10946174838622959140,4223943380306587667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2856
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:580
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:648
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:484
                        • C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe
                          "C:\Users\Admin\Desktop\Quasar v1.4.1\Quasar.exe"
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:4692
                          • C:\Windows\explorer.exe
                            "C:\Windows\explorer.exe" /select, "C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12"
                            2⤵
                              PID:2884
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                            1⤵
                            • Modifies Internet Explorer settings
                            • Modifies registry class
                            • Suspicious behavior: AddClipboardFormatListener
                            • Suspicious use of SetWindowsHookEx
                            PID:2356

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            5431d6602455a6db6e087223dd47f600

                            SHA1

                            27255756dfecd4e0afe4f1185e7708a3d07dea6e

                            SHA256

                            7502d9453168c86631fb40ec90567bf80404615d387afc7ec2beb7a075bcc763

                            SHA512

                            868f6dcf32ef80459f3ea122b0d2c79191193b5885c86934a97bfec7e64250e10c23e4d00f34c6c2387a04a15f3f266af96e571bbe37077fb374d6d30f35b829

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            7bed1eca5620a49f52232fd55246d09a

                            SHA1

                            e429d9d401099a1917a6fb31ab2cf65fcee22030

                            SHA256

                            49c484f08c5e22ee6bec6d23681b26b0426ee37b54020f823a2908ab7d0d805e

                            SHA512

                            afc8f0b5b95d593f863ad32186d1af4ca333710bcfba86416800e79528616e7b15f8813a20c2cfa9d13688c151bf8c85db454a9eb5c956d6e49db84b4b222ee8

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            240B

                            MD5

                            ac6fe1d988d8023bbdd624970858ae47

                            SHA1

                            8b6213d9d13ef5fbe798c8b8e0bdf3724282ce6b

                            SHA256

                            c551a08467f1593417744b7b4a8ee8d3c9a15ebdb0107fa4e6d5aa246b8f7428

                            SHA512

                            6078340258c4c25efd92e83b829ecd3790d8a7fa570974c3a9bbd10dde9ab3eec9744a8019f62579dc541954cddf83cf2e80c538730151511aecae7d9af4d71f

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            0fb9a8565be80560f5ba259b447ab067

                            SHA1

                            36b451ff1706805942274834d84e7f3ad190d2da

                            SHA256

                            c908f86b19f9328942626f3ed6478bb0ca31f30f583bbc30ca2b03a5a33e0583

                            SHA512

                            201bf27c7da81c203482b897d1f1180252708f9bc73a584a7a512ce5b85cf9456014e41b39a15293d99d6eb3bea161d283a67737453c4b7ed47f73e0bf57b722

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            e22265b5013c56aec4acaf704d558340

                            SHA1

                            4a729eab77b862e79ee3868efac369ac4551bf0c

                            SHA256

                            177214c72e1a93d33dfbc1e280a6b0457a03166c5ca673b8d81b694d6111eaef

                            SHA512

                            aab641e0ca21c2bbe645690533625d11b9260e713b9b9be5d565d41121f0645e573c75a890e9e76cef88677076af4a3c1765c7b89656a5bd89b4b0ef25910fe8

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            46295cac801e5d4857d09837238a6394

                            SHA1

                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                            SHA256

                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                            SHA512

                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            206702161f94c5cd39fadd03f4014d98

                            SHA1

                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                            SHA256

                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                            SHA512

                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            10KB

                            MD5

                            6c638571845fd8c8034a3704a2fb5692

                            SHA1

                            9e9a3830ecc949832d3cdac081c45a9d743f4ac5

                            SHA256

                            13ee44b02d3a4d8685ddd7f342c8ee9ffb3527a139a8b40cdf9c7fd695606ad2

                            SHA512

                            df1a80332fde15d94d0d8db84ae936ce1f62dfc768bf0145d343645f026a17bac183aedbcf873db8952ea977eb98c2f70bb7916cd873ea3be1846d23849231ba

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            10KB

                            MD5

                            373511315bf10efff1197d0baac2e4b3

                            SHA1

                            8aa2d197801c71cbf05a7b6908b303dc946ec11a

                            SHA256

                            d833a7bbdc5f6df967b72a15ea3916dda0548621857622be99c2073bfe9426dc

                            SHA512

                            7a745d85b564cee10679075e45ba7e0519514ff6c4d5e98d563bac2f2d098bd0b021f89f77d981d1667a0657718e297fab63617ce3e64b23d0162bb1a751e842

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                            Filesize

                            14KB

                            MD5

                            b4202a87fdc08d2d0b4445a3ed2819d5

                            SHA1

                            c3eae99d56ab950093135ffb70d6197e0e27b17a

                            SHA256

                            fcdf5eceff6cf7ee4b46dd992c236b496040afeef6e4a02a2e4a313a6e92c562

                            SHA512

                            eb2be4a75f30db205c7cc0f97ff182dea0be7b33eacda2564e3d8b1353100aa152ca3600372164ebc9581d9dd6474ab64a43bf24afbee4826431ff231b7c99b8

                          • C:\Users\Admin\Desktop\Quasar v1.4.1\quasar.p12

                            Filesize

                            4KB

                            MD5

                            70abe5018ceb62f7a8ed341477a31ca3

                            SHA1

                            fe12dc6f4845853568685491edf8735901fafb5b

                            SHA256

                            e1cc192dfe33f5ca0fc1c842390ef7d2155585b81264b2cc3e9a1c2581e92517

                            SHA512

                            2140cd647c75ce6261c26446ea07ccd86a766dfb2c61a11950f53664b792d844315f03f3842fe4e83132f21d1371c7cc4fbfac1592f3974add3c5c29290ad3c8

                          • C:\Users\Admin\Downloads\Quasar.v1.4.1.zip:Zone.Identifier

                            Filesize

                            26B

                            MD5

                            fbccf14d504b7b2dbcb5a5bda75bd93b

                            SHA1

                            d59fc84cdd5217c6cf74785703655f78da6b582b

                            SHA256

                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                            SHA512

                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                          • C:\Users\Admin\Downloads\Unconfirmed 360603.crdownload

                            Filesize

                            3.3MB

                            MD5

                            13aa4bf4f5ed1ac503c69470b1ede5c1

                            SHA1

                            c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

                            SHA256

                            4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

                            SHA512

                            767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

                          • memory/4692-119-0x000001EDB0FA0000-0x000001EDB12CE000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/4692-118-0x000001ED944B0000-0x000001ED944C6000-memory.dmp

                            Filesize

                            88KB

                          • memory/4692-117-0x000001ED93F20000-0x000001ED94058000-memory.dmp

                            Filesize

                            1.2MB

                          • memory/4692-162-0x000001EDAF1B0000-0x000001EDAF1C8000-memory.dmp

                            Filesize

                            96KB

                          • memory/4692-163-0x000001EDAF220000-0x000001EDAF270000-memory.dmp

                            Filesize

                            320KB

                          • memory/4692-164-0x000001EDB0BA0000-0x000001EDB0C52000-memory.dmp

                            Filesize

                            712KB

                          • memory/4692-165-0x000001EDAF270000-0x000001EDAF2BC000-memory.dmp

                            Filesize

                            304KB