Resubmissions

16-12-2024 06:21

241216-g4qyfsxre1 10

16-12-2024 06:08

241216-gv76daxnct 10

Analysis

  • max time kernel
    224s
  • max time network
    229s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    16-12-2024 06:21

General

  • Target

    SerialChecker.exe

  • Size

    3.1MB

  • MD5

    70fa564a25bdd50a78764228f591f9a0

  • SHA1

    2d025703005c25bc35b4755321844f3adc41c974

  • SHA256

    9fda62581f43e3936e371ced328374f97a7ede2b9fff3748bf618977b1da495a

  • SHA512

    ce33af378f45752148de566ec1281a4e212b5af8e9d9d942f833f8d35a5c5d84f8657f17dc053d4bd56ae6ea556122de8039d0cab8c37d6eb5af9f89041eaff3

  • SSDEEP

    49152:Ovkt62XlaSFNWPjljiFa2RoUYIbnp9nr1oGdI2THHB72eh2NT:Ov462XlaSFNWPjljiFXRoUYI7p9nZ

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

FN

C2

192.168.1.217:4782

Mutex

5c3e1592-9532-4a55-9a67-38ea1d723d1f

Attributes
  • encryption_key

    53C48FEB4994411E81FCC7855A2076C90E2AC3C1

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Update

  • subdirectory

    FN

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SerialChecker.exe
    "C:\Users\Admin\AppData\Local\Temp\SerialChecker.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\FN\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:5628
    • C:\Users\Admin\AppData\Roaming\FN\Client.exe
      "C:\Users\Admin\AppData\Roaming\FN\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1368
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\FN\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5684
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2476
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Logs\2024-12-16
        2⤵
          PID:4708
      • C:\Windows\system32\mmc.exe
        "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
        1⤵
        • Drops file in System32 directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4260
      • C:\Users\Admin\AppData\Roaming\FN\Client.exe
        "C:\Users\Admin\AppData\Roaming\FN\Client.exe"
        1⤵
        • Executes dropped EXE
        PID:5508

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\FN\Client.exe

        Filesize

        3.1MB

        MD5

        70fa564a25bdd50a78764228f591f9a0

        SHA1

        2d025703005c25bc35b4755321844f3adc41c974

        SHA256

        9fda62581f43e3936e371ced328374f97a7ede2b9fff3748bf618977b1da495a

        SHA512

        ce33af378f45752148de566ec1281a4e212b5af8e9d9d942f833f8d35a5c5d84f8657f17dc053d4bd56ae6ea556122de8039d0cab8c37d6eb5af9f89041eaff3

      • C:\Users\Admin\AppData\Roaming\Logs\2024-12-16

        Filesize

        496B

        MD5

        d125843d84a2fa51f3296930931d0ce6

        SHA1

        3c1fa7d92de37d9e510fdd7d78e690279e502e0b

        SHA256

        b03f645a92e5ac996ee184ec115b6dce4a8c5ef3b0951e374443a35202cd720e

        SHA512

        612130e5c1eb5b24de4fbd45d2bbb02f055efca9b003a7b9b1c9b77210c5aa8920e11ea6bab02b6a804eafd67784d4e4127806d40dabbf17d01958784fad5e44

      • memory/1368-7-0x00007FFD97B40000-0x00007FFD98602000-memory.dmp

        Filesize

        10.8MB

      • memory/1368-6-0x00007FFD97B40000-0x00007FFD98602000-memory.dmp

        Filesize

        10.8MB

      • memory/1368-8-0x000000001CE70000-0x000000001CEC0000-memory.dmp

        Filesize

        320KB

      • memory/1368-9-0x000000001CF80000-0x000000001D032000-memory.dmp

        Filesize

        712KB

      • memory/1368-10-0x000000001D670000-0x000000001DB98000-memory.dmp

        Filesize

        5.2MB

      • memory/1368-11-0x00007FFD97B40000-0x00007FFD98602000-memory.dmp

        Filesize

        10.8MB

      • memory/1368-12-0x00007FFD97B40000-0x00007FFD98602000-memory.dmp

        Filesize

        10.8MB

      • memory/1484-2-0x00007FFD97B40000-0x00007FFD98602000-memory.dmp

        Filesize

        10.8MB

      • memory/1484-5-0x00007FFD97B40000-0x00007FFD98602000-memory.dmp

        Filesize

        10.8MB

      • memory/1484-0-0x00007FFD97B43000-0x00007FFD97B45000-memory.dmp

        Filesize

        8KB

      • memory/1484-1-0x00000000001B0000-0x00000000004D4000-memory.dmp

        Filesize

        3.1MB