Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 17:05
Behavioral task
behavioral1
Sample
tester.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
tester.exe
-
Size
3.1MB
-
MD5
27c0523d7437829756f0978f99d8580c
-
SHA1
9e1ac378cf2d3d050500e4d6ecb9446b4c67b9f9
-
SHA256
0933eec609cdbe8f29a9b25ed5814eb1cb7481299b0ac8f301e140f1a55efa2a
-
SHA512
99423319c3ca06559f585204d3ee8ec43d4bd4bc81b457be0ce3dd97e03beef24de7706570c50a445d09427039334aaa4684a62e1cc8ce71ddbf726cd391fa68
-
SSDEEP
49152:PvTlL26AaNeWgPhlmVqvMQ7XSKTJhVQBxcLoGdtTHHB72eh2NT:PvJL26AaNeWgPhlmVqkQ7XSKjVr
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
agent-sellers.gl.at.ply.gg:4782
Mutex
92c4e81f-9c37-4d95-9999-1d9c889d6132
Attributes
-
encryption_key
EB7BD173527D0274DC795166855DE989150B7BE8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1628-1-0x0000000001130000-0x0000000001454000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 tester.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 tester.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1628 tester.exe