Analysis

  • max time kernel
    115s
  • max time network
    112s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    15-12-2024 15:53

General

  • Target

    app1.exe

  • Size

    3.1MB

  • MD5

    829605130c3b20269b5c56ca026241ab

  • SHA1

    61f20276c524f8852911b027b95cecff5075e650

  • SHA256

    fab76f9a2d47107dffa334b26f109cbe8a4f06ee8b936a622dc1f571e8412c23

  • SHA512

    f097b0d4c461ae9fddb29cb42722041d78ef6a7bc01754fca72d321e8dd3359b41438be8639fa00c21f673ff0380ea9316b99dd648f47a4c6bdd6dc74fbc293b

  • SSDEEP

    49152:KvWI22SsaNYfdPBldt698dBcjHaAaax7martAoGd8rtolTHHB72eh2NT:Kv722SsaNYfdPBldt6+dBcjHBp7ys

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

KDOTCrypt

C2

fedx.ddns.net:7000

Mutex

05ed390b-a98b-426c-bddb-fc4eab59ee87

Attributes
  • encryption_key

    92470F4731518ABFA77DC89068544FB7E7B7C459

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 12 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\app1.exe
    "C:\Users\Admin\AppData\Local\Temp\app1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5144
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\f5hDfUk7F9CZ.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5264
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3408
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:5180
        • C:\Users\Admin\AppData\Local\Temp\app1.exe
          "C:\Users\Admin\AppData\Local\Temp\app1.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4300
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9dlmq0rqjBHz.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:5236
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:5192
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:1280
              • C:\Users\Admin\AppData\Local\Temp\app1.exe
                "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                5⤵
                • Checks computer location settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1200
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GNtRbYQjJBOL.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:6104
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:5272
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      7⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:5344
                    • C:\Users\Admin\AppData\Local\Temp\app1.exe
                      "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                      7⤵
                      • Checks computer location settings
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3668
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2aZagx5tInoe.bat" "
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2896
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          9⤵
                            PID:5388
                          • C:\Windows\system32\PING.EXE
                            ping -n 10 localhost
                            9⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:6140
                          • C:\Users\Admin\AppData\Local\Temp\app1.exe
                            "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                            9⤵
                            • Checks computer location settings
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:5944
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\l3G2DcgAFJQr.bat" "
                              10⤵
                              • Suspicious use of WriteProcessMemory
                              PID:5996
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                11⤵
                                  PID:4040
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  11⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:6000
                                • C:\Users\Admin\AppData\Local\Temp\app1.exe
                                  "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                                  11⤵
                                  • Checks computer location settings
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:232
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WaHdiabigU6x.bat" "
                                    12⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:5868
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      13⤵
                                        PID:1356
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        13⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:4212
                                      • C:\Users\Admin\AppData\Local\Temp\app1.exe
                                        "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                                        13⤵
                                        • Checks computer location settings
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:4000
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\396dPdElEwH8.bat" "
                                          14⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:3740
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            15⤵
                                              PID:456
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              15⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:1180
                                            • C:\Users\Admin\AppData\Local\Temp\app1.exe
                                              "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                                              15⤵
                                              • Checks computer location settings
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:3692
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AVZGZZdxc4aY.bat" "
                                                16⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:4224
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  17⤵
                                                    PID:3756
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 10 localhost
                                                    17⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:4052
                                                  • C:\Users\Admin\AppData\Local\Temp\app1.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                                                    17⤵
                                                    • Checks computer location settings
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5112
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XfCT8LztNVuK.bat" "
                                                      18⤵
                                                        PID:4400
                                                        • C:\Windows\system32\chcp.com
                                                          chcp 65001
                                                          19⤵
                                                            PID:2268
                                                          • C:\Windows\system32\PING.EXE
                                                            ping -n 10 localhost
                                                            19⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:2352
                                                          • C:\Users\Admin\AppData\Local\Temp\app1.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                                                            19⤵
                                                            • Checks computer location settings
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:4756
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PXKYJhGuxk9u.bat" "
                                                              20⤵
                                                                PID:4676
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  21⤵
                                                                    PID:3056
                                                                  • C:\Windows\system32\PING.EXE
                                                                    ping -n 10 localhost
                                                                    21⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:3080
                                                                  • C:\Users\Admin\AppData\Local\Temp\app1.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                                                                    21⤵
                                                                    • Checks computer location settings
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4980
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NrxNzGzISq7j.bat" "
                                                                      22⤵
                                                                        PID:2164
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          23⤵
                                                                            PID:1484
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            23⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:3904
                                                                          • C:\Users\Admin\AppData\Local\Temp\app1.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\app1.exe"
                                                                            23⤵
                                                                            • Checks computer location settings
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2204
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WivOHGyFAwUN.bat" "
                                                                              24⤵
                                                                                PID:3876
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  25⤵
                                                                                    PID:404
                                                                                  • C:\Windows\system32\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    25⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:5360

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\app1.exe.log

                                    Filesize

                                    2KB

                                    MD5

                                    7787ce173dfface746f5a9cf5477883d

                                    SHA1

                                    4587d870e914785b3a8fb017fec0c0f1c7ec0004

                                    SHA256

                                    c339149818fa8f9e5af4627715c3afe4f42bc1267df17d77a278d4c811ed8df1

                                    SHA512

                                    3a630053ae99114292f8cf8d45600f8fe72125795252bf76677663476bd2275be084a1af2fcb4ce30409ba1b5829b2b3ffb6795de46d2a703c3314017a86f1ff

                                  • C:\Users\Admin\AppData\Local\Temp\2aZagx5tInoe.bat

                                    Filesize

                                    201B

                                    MD5

                                    f51393b1df66d2c205c7a56b4620808f

                                    SHA1

                                    36dd383f1c4aeb042ea1e6a5a28bd2d988d05096

                                    SHA256

                                    3361a8ce6fb6e0a246a828e1ae7fe17bf068a08cc0cf55c2d711024bbd0e4be3

                                    SHA512

                                    4d25d95493c3261875579ff8da4b86199f541f0f6e92a7168beaf03de0c7a59a2e26a2fa001ee01c0b7a12c21c597615140a2323483ec5877e4505b1eea91039

                                  • C:\Users\Admin\AppData\Local\Temp\396dPdElEwH8.bat

                                    Filesize

                                    201B

                                    MD5

                                    177609099b05308eab890bf714d69434

                                    SHA1

                                    e631c753f9772d96564a17979e84447e1cfac89a

                                    SHA256

                                    77bd73cbe422e1aff5e473ce1b01689692b7ec2459bf95adeb1bfe7624286868

                                    SHA512

                                    1b36858e79eb7bdcd5a05dd098899e34c22febfe3b9a3b8088de5d689b653de122dc631cf7b4965f9a057ff8653276100fdd5f0a1933cae6b3f38d1d93dbc505

                                  • C:\Users\Admin\AppData\Local\Temp\9dlmq0rqjBHz.bat

                                    Filesize

                                    201B

                                    MD5

                                    e179049193f41564e2e9ca4bbfa57bbf

                                    SHA1

                                    fa48fb06d685426fec53bef8dd0455b0fdbbde03

                                    SHA256

                                    60b67e5d7eec74e6adab5d08e7ea395da5022775c822db9f2e04215291a1d99f

                                    SHA512

                                    f0a8059a80fcff657ca5734ebe726d51793c760595015f3a25098da221195265f14fac4c33cb3e9348f0b838c263b508d6d8ed8372bbba144d6f6896432650c4

                                  • C:\Users\Admin\AppData\Local\Temp\AVZGZZdxc4aY.bat

                                    Filesize

                                    201B

                                    MD5

                                    f3f44d43be50090d3eb24884eb781bff

                                    SHA1

                                    c14498842ce3f4ad5dc5923c84e38d3256cacb78

                                    SHA256

                                    a1ce5ea165f1d75ecef36e257cbb5989bc1cce59fd056e87f49c26297c204a3e

                                    SHA512

                                    0288f3735bb3ed4526728760783414d97513b2337afa12047a16ed884b13838a9ec08d06ba73dfaa7cb7c396a564a1488ad69bda26b9280c2bf2543ca294fcde

                                  • C:\Users\Admin\AppData\Local\Temp\GNtRbYQjJBOL.bat

                                    Filesize

                                    201B

                                    MD5

                                    0c35341b5e3f75e610edbd54a9ed8793

                                    SHA1

                                    1cc36476af7952757cc79f85c855b569a5f460cb

                                    SHA256

                                    a98b1672babd28c0f155a99bf33f9060a3e55a3c5fcd37caf3cafab33dcfba6c

                                    SHA512

                                    9fade665c6ca6f5085c8f9d4d77fbe4f8604d82afa654475f3bfdd43b0bb1bfd2dbd4ce4a61365b03fa52ac64f2587710fc78a964201f096659065ceaa196566

                                  • C:\Users\Admin\AppData\Local\Temp\NrxNzGzISq7j.bat

                                    Filesize

                                    201B

                                    MD5

                                    6c2c962d86ed5711f32d4c523324e9a2

                                    SHA1

                                    576c30d811ca2dc1754042acaf04ef154c3c9f55

                                    SHA256

                                    96e563efc4d64889b74a7de8b04f5f9728eb99bac0be0ef1a739b9e709d29c0c

                                    SHA512

                                    ac452acc5b96f9460b3e0e7365b3e533757ec27c4d31ab916f11e6a5f7d9b3e6262fe688d6dcb2d69bb422105bb6f0e9fd9e8efa902e0dab93122a906fa6dab7

                                  • C:\Users\Admin\AppData\Local\Temp\PXKYJhGuxk9u.bat

                                    Filesize

                                    201B

                                    MD5

                                    6dcbf247ac7b9d38e6fe91bf2d2fa38e

                                    SHA1

                                    7aa6e3bf5edeab28504f5c32a57cf6c88d3d3e3f

                                    SHA256

                                    98c89bc83ac9ef032f524a5ce887b8829fe1958d719eec01314765f2a32e64b5

                                    SHA512

                                    91357305283165da95d954b788f20ad6ed10c158ddeee066905399b6e4b5aaa6bb8b8dcdee75291a04039469d70a366eb5f29f8acccf3bf8af51591b7090e598

                                  • C:\Users\Admin\AppData\Local\Temp\WaHdiabigU6x.bat

                                    Filesize

                                    201B

                                    MD5

                                    75f9910349e048718bdc6d1cc1fd2a19

                                    SHA1

                                    208230b5a229e7a1f160bdac70cdae903fc229ac

                                    SHA256

                                    78237a7be37d1926716e13759e5967f75c6c94805132f8b4bc82fcf3a71fa6f2

                                    SHA512

                                    e9b6a141a48df9da6963582af4edf9e861b7bf041843008a1e64b8565272526c51fbe2ffc7c3f9c2fb86bed7bbaeeea14fdb68e0db788086d8d8b5c69a11b973

                                  • C:\Users\Admin\AppData\Local\Temp\WivOHGyFAwUN.bat

                                    Filesize

                                    201B

                                    MD5

                                    bb3e0cbe18f312aea91fdbe8f85128fe

                                    SHA1

                                    071eba0e9241a93d3ca510707cec93aeadbb4047

                                    SHA256

                                    16ed386eeae9e454621d47cb0c0c5363dd95235705d8da3ecc38b1c0511583dc

                                    SHA512

                                    06b3fa4ce4ee261f2349a4a7273785e2aa5381786b725d1404173db605d468604c5e2e1bd494fe8dee61a1fae08f8d9721bfe39283bec74289f2a11c714d6fa0

                                  • C:\Users\Admin\AppData\Local\Temp\XfCT8LztNVuK.bat

                                    Filesize

                                    201B

                                    MD5

                                    ffe8f0a5be0c75db753c06f75e474127

                                    SHA1

                                    6b86271749bb24822c34f49769b1924fc337255e

                                    SHA256

                                    df05d33c7838365943c0d459842fbe64578cf11fe9fa9959e964cc1a294a90db

                                    SHA512

                                    34614e439956226448a7885051ec0e4f95ec848eaa1452e9b3edb6c7810c8c178851109af3f423407601dac1d6cfb56605036f548385d9538c80256a237674d9

                                  • C:\Users\Admin\AppData\Local\Temp\f5hDfUk7F9CZ.bat

                                    Filesize

                                    201B

                                    MD5

                                    119e31c935eef79b8c98b6bf68ed768e

                                    SHA1

                                    934617b8cfe94882b74949f713ac623a148f6906

                                    SHA256

                                    73ea73ce64010ff87b37103aabd4988542fe3a2cb874b8c6d7eacffe190188d8

                                    SHA512

                                    ac5b9343fb874146358fd2479a194b6f0e8579a868a5c0aa7f6ba15e38cd7b01b34960d5572b3cc2c952519ea78144114b3f9b01468666ed76f05bae35c7f9ed

                                  • C:\Users\Admin\AppData\Local\Temp\l3G2DcgAFJQr.bat

                                    Filesize

                                    201B

                                    MD5

                                    25a9ce26fbdc4f46fc01ece9d87408ca

                                    SHA1

                                    1e0752c90ec4601a9e1667e13b0f00ecd16f10f5

                                    SHA256

                                    f1c46837ffddd0b4e24d8dbf4f99957a587999c1231f21dc6eb35b5252365c1a

                                    SHA512

                                    14a725eb9df5661dedd05004ff9e202b18f23c0d1038eb5c25ada4db26e0990f363949cb4af599d39f4e2a97d4f3d01011ea47d995e71cf1131ab32c7414d5f7

                                  • memory/4300-15-0x00007FFDEB030000-0x00007FFDEBAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4300-23-0x00007FFDEB030000-0x00007FFDEBAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/4300-16-0x00007FFDEB030000-0x00007FFDEBAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5144-12-0x00007FFDEB030000-0x00007FFDEBAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5144-3-0x000000001E2B0000-0x000000001E300000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/5144-4-0x000000001E3C0000-0x000000001E472000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/5144-2-0x00007FFDEB030000-0x00007FFDEBAF2000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/5144-1-0x0000000000A30000-0x0000000000D54000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/5144-0-0x00007FFDEB033000-0x00007FFDEB035000-memory.dmp

                                    Filesize

                                    8KB