Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 16:49
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
test.exe
-
Size
3.1MB
-
MD5
d4d76dd987ddbf6c4be9cf1ff58cbfeb
-
SHA1
21bb07280d3ef10cb0983b8d795284530d0cf93a
-
SHA256
44be1930012524d9974e8150d3d387bf3c1cb7d52c13c31f02630bab7374e4cc
-
SHA512
f1b62314853bc09fe5aa41e0746018cbfd411115cb90c7e27edca8d2b1f572b2e270c481c4cdbf902e870ceef6c869bdad2f137159c506cb15142f4a5b738f4a
-
SSDEEP
49152:jvTlL26AaNeWgPhlmVqvMQ7XSKrBWau5p+Rk/0LoGdsTHHB72eh2NT:jvJL26AaNeWgPhlmVqkQ7XSKgad
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
agent-sellers.gl.at.ply.gg:31324
Mutex
92c4e81f-9c37-4d95-9999-1d9c889d6132
Attributes
-
encryption_key
EB7BD173527D0274DC795166855DE989150B7BE8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2040-1-0x0000000000560000-0x0000000000884000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2040 test.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 test.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2040 test.exe