Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16/12/2024, 06:38 UTC

General

  • Target

    jignesh.exe

  • Size

    3.1MB

  • MD5

    64da51697ac726c1e27f5d7899c89cac

  • SHA1

    29f336e761644ff1bd932d5649b5275fd7fd79b3

  • SHA256

    611f6deadda658b042a6636e5e69c381fa65ed5cab95d2e8f5e43c285ed3cfc7

  • SHA512

    a4a123f0787b23a29c77ae6a3baa348cddbfe8b0232d0562982874462f49cf3ec4066356837780be8b3b516d640049b47e4cfea0e0659e37beed8f2265d92751

  • SSDEEP

    49152:Wvht62XlaSFNWPjljiFa2RoUYISURJ6jbR3LoGddTHHB72eh2NT:WvL62XlaSFNWPjljiFXRoUYISURJ6V

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

98.51.190.130:20

Mutex

11bbf22e-826e-486b-b024-adbd86228a9e

Attributes
  • encryption_key

    7A589EDBC6A581E125BF830EF0D05FC74BB75E30

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    ctfmon

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\jignesh.exe
    "C:\Users\Admin\AppData\Local\Temp\jignesh.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2140
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2564

Network

    No results found
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    928 B
    2.2kB
    9
    6
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    565 B
    3.6kB
    9
    6
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
  • 98.51.190.130:20
    tls
    Client.exe
    409 B
    2.2kB
    6
    5
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

    Filesize

    3.1MB

    MD5

    64da51697ac726c1e27f5d7899c89cac

    SHA1

    29f336e761644ff1bd932d5649b5275fd7fd79b3

    SHA256

    611f6deadda658b042a6636e5e69c381fa65ed5cab95d2e8f5e43c285ed3cfc7

    SHA512

    a4a123f0787b23a29c77ae6a3baa348cddbfe8b0232d0562982874462f49cf3ec4066356837780be8b3b516d640049b47e4cfea0e0659e37beed8f2265d92751

  • memory/2344-0-0x000007FEF5A73000-0x000007FEF5A74000-memory.dmp

    Filesize

    4KB

  • memory/2344-1-0x00000000009C0000-0x0000000000CE4000-memory.dmp

    Filesize

    3.1MB

  • memory/2344-2-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2344-8-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2956-9-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2956-10-0x00000000011A0000-0x00000000014C4000-memory.dmp

    Filesize

    3.1MB

  • memory/2956-11-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2956-12-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

  • memory/2956-13-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp

    Filesize

    9.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.