Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 12:04
Behavioral task
behavioral1
Sample
854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe
Resource
win7-20241010-en
General
-
Target
854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe
-
Size
3.1MB
-
MD5
051bfba0c640694d241f6b3621e241b6
-
SHA1
a5269b7485203914af50cb932d952c10440878c9
-
SHA256
854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09
-
SHA512
bdfea5dfca423c4d66de1c9f435a1c0403b8615a0b7627fff665876fa2da48e8914cc2961ca9e66b7d32d2bc4004354e5e932297a479fcc90d495327d14577dc
-
SSDEEP
49152:AvKgo2QSaNpzyPllgamb0CZof/JDj5RbR4jRoGdMOAuTHHB72eh2NT:Avjo2QSaNpzyPllgamYCZof/JDj5wFc
Malware Config
Extracted
quasar
1.4.1
SGVP
192.168.1.9:4782
150.129.206.176:4782
Ai-Sgvp-33452.portmap.host:33452
2464c7bf-a165-4397-85fe-def5290750b0
-
encryption_key
09BBDA8FF0524296F02F8F81158F33C0AA74D487
-
install_name
User Application Data.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windowns Client Startup
-
subdirectory
Quasar
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2696-1-0x00000000004C0000-0x00000000007E4000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4936 PING.EXE 2620 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2620 PING.EXE 4936 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4004 schtasks.exe 5024 schtasks.exe 1076 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2696 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe Token: SeDebugPrivilege 4732 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe Token: SeDebugPrivilege 4512 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2696 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 4732 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 4512 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4004 2696 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 82 PID 2696 wrote to memory of 4004 2696 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 82 PID 2696 wrote to memory of 2548 2696 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 102 PID 2696 wrote to memory of 2548 2696 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 102 PID 2548 wrote to memory of 1368 2548 cmd.exe 104 PID 2548 wrote to memory of 1368 2548 cmd.exe 104 PID 2548 wrote to memory of 2620 2548 cmd.exe 105 PID 2548 wrote to memory of 2620 2548 cmd.exe 105 PID 2548 wrote to memory of 4732 2548 cmd.exe 107 PID 2548 wrote to memory of 4732 2548 cmd.exe 107 PID 4732 wrote to memory of 5024 4732 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 108 PID 4732 wrote to memory of 5024 4732 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 108 PID 4732 wrote to memory of 1132 4732 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 112 PID 4732 wrote to memory of 1132 4732 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 112 PID 1132 wrote to memory of 3396 1132 cmd.exe 114 PID 1132 wrote to memory of 3396 1132 cmd.exe 114 PID 1132 wrote to memory of 4936 1132 cmd.exe 115 PID 1132 wrote to memory of 4936 1132 cmd.exe 115 PID 1132 wrote to memory of 4512 1132 cmd.exe 117 PID 1132 wrote to memory of 4512 1132 cmd.exe 117 PID 4512 wrote to memory of 1076 4512 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 118 PID 4512 wrote to memory of 1076 4512 854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe"C:\Users\Admin\AppData\Local\Temp\854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cb6SYzzQBjSC.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe"C:\Users\Admin\AppData\Local\Temp\854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe"3⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lEyDWfii2u4r.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:3396
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe"C:\Users\Admin\AppData\Local\Temp\854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:1076
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09.exe.log
Filesize2KB
MD58f0271a63446aef01cf2bfc7b7c7976b
SHA1b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7
SHA256da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c
SHA51278a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5
-
Filesize
261B
MD5163d2959e97c26c63b60d865a09e5a61
SHA1f1529df6b0c1edb0298ac14c35806676f09d2ee6
SHA2568521e2f26f7807cc055b469ef38c62ff98fef117119d993d77cff3aaf9f23041
SHA5122e33aecea963822c3890ec2e76abb035b61f7156221d649e7e97546e1db22c3e5d5ad671a462cf2dadb6c3e1cebee6ad224bc46692f233980c19c44caf30ed09
-
Filesize
261B
MD58fe66eb21d1e5d13b086bc7070033101
SHA1be6836c042f8238428eab86e5da53a60908de5a5
SHA256f9db9b0f98e55ff2a13eb074fa86061d7e948b79c3fe27cad4b4875b8263693a
SHA512559240dfcd72eb32024d014158643c51db67f581e1f02d004a954c3a818f56ada26914683c0450ed71c3d6333b4eb5c27aa134df0aa197410a47bba55fe16cd3