Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 22:03

General

  • Target

    testv12.exe

  • Size

    3.1MB

  • MD5

    8f131c77156b85ca15444aabe87333ef

  • SHA1

    5402d8163423097e863bea234d211f5b13258a4b

  • SHA256

    84386ba4be46d6a071c25da1ec4f339817aeaad478a6ca9453e1935205571f20

  • SHA512

    95f05308d912a25b42a73e09c061ee88cedadb5080653ae8ae794f4de6e581c099f49dbc7943f54be838b72ac7649ff573f63e7326c0a8688e7508b62deb90b0

  • SSDEEP

    49152:Xv3lL26AaNeWgPhlmVqvMQ7XSKC1mKmzOUoGdcQTHHB72eh2NT:Xv1L26AaNeWgPhlmVqkQ7XSKC1mp

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

4.tcp.eu.ngrok.io:16602

4.tcp.eu.ngrok.io:7724

Mutex

af6a836a-9106-4785-8dce-1ced637f2ecd

Attributes
  • encryption_key

    50B793FC4C8129DCCC330E337AEC3777884F3B64

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\testv12.exe
    "C:\Users\Admin\AppData\Local\Temp\testv12.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/344-0-0x00007FFBA8E03000-0x00007FFBA8E05000-memory.dmp

    Filesize

    8KB

  • memory/344-1-0x0000000000860000-0x0000000000B84000-memory.dmp

    Filesize

    3.1MB

  • memory/344-2-0x00007FFBA8E00000-0x00007FFBA98C1000-memory.dmp

    Filesize

    10.8MB

  • memory/344-3-0x000000001DBF0000-0x000000001DC40000-memory.dmp

    Filesize

    320KB

  • memory/344-4-0x000000001DD00000-0x000000001DDB2000-memory.dmp

    Filesize

    712KB

  • memory/344-7-0x000000001DC80000-0x000000001DC92000-memory.dmp

    Filesize

    72KB

  • memory/344-8-0x000000001E500000-0x000000001E53C000-memory.dmp

    Filesize

    240KB

  • memory/344-9-0x00007FFBA8E03000-0x00007FFBA8E05000-memory.dmp

    Filesize

    8KB

  • memory/344-10-0x00007FFBA8E00000-0x00007FFBA98C1000-memory.dmp

    Filesize

    10.8MB