Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 06:28

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    218b79ebe7679fa1beab775ca7e49c4b

  • SHA1

    2d08ac223c07b13e93e6f8e2d73d3b7b08f4b54f

  • SHA256

    adc4c01dc28064c32c6b451a9c7d82001b21c9f58022a78dfbcbd8a36291aee1

  • SHA512

    8e92fef65245e770a66d849c14bc344ff7231c68cb5e31e2ad6c5f1a7bfa85d4db89e426a2fdb22d9fead1563c9352693cbbeaecfe3252ad777ca9e035f15002

  • SSDEEP

    49152:3vbI22SsaNYfdPBldt698dBcjHcxDE/glk/JxjoGdeTHHB72eh2NT:3vk22SsaNYfdPBldt6+dBcjHcxKF

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

127.0.0.0.1:4782

Mutex

89f58ee5-7af9-42de-843f-2a331a641e3f

Attributes
  • encryption_key

    CD4F349DEB46AEE10C2FE886E5B2BD7A766723CE

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 12 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\a0PuT5uExt8t.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2764
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3048
        • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
          "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\xZkBJ5I2KqoL.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1976
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:2700
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2724
              • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                5⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2352
                • C:\Windows\system32\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\S0gwlyjZ6j91.bat" "
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2156
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:2084
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      7⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:1640
                    • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                      "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                      7⤵
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2176
                      • C:\Windows\system32\cmd.exe
                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\xcPzQzBt2Jgr.bat" "
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2472
                        • C:\Windows\system32\chcp.com
                          chcp 65001
                          9⤵
                            PID:2908
                          • C:\Windows\system32\PING.EXE
                            ping -n 10 localhost
                            9⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Runs ping.exe
                            PID:840
                          • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                            "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                            9⤵
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of WriteProcessMemory
                            PID:2464
                            • C:\Windows\system32\cmd.exe
                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\V1YeAGYcR3eS.bat" "
                              10⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2300
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                11⤵
                                  PID:2228
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  11⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:3056
                                • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                  11⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of WriteProcessMemory
                                  PID:2480
                                  • C:\Windows\system32\cmd.exe
                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\AMgpoKePxuAn.bat" "
                                    12⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:1616
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      13⤵
                                        PID:848
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        13⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:2632
                                      • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                        13⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:844
                                        • C:\Windows\system32\cmd.exe
                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\WCpa9OHAS6qJ.bat" "
                                          14⤵
                                            PID:648
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              15⤵
                                                PID:1292
                                              • C:\Windows\system32\PING.EXE
                                                ping -n 10 localhost
                                                15⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:1668
                                              • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                                15⤵
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:1628
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\yl37B9K7jxRR.bat" "
                                                  16⤵
                                                    PID:2564
                                                    • C:\Windows\system32\chcp.com
                                                      chcp 65001
                                                      17⤵
                                                        PID:1588
                                                      • C:\Windows\system32\PING.EXE
                                                        ping -n 10 localhost
                                                        17⤵
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:1968
                                                      • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                                        17⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:2808
                                                        • C:\Windows\system32\cmd.exe
                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\k2dNWozKZ2BH.bat" "
                                                          18⤵
                                                            PID:2328
                                                            • C:\Windows\system32\chcp.com
                                                              chcp 65001
                                                              19⤵
                                                                PID:3048
                                                              • C:\Windows\system32\PING.EXE
                                                                ping -n 10 localhost
                                                                19⤵
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Runs ping.exe
                                                                PID:2868
                                                              • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                                                19⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:2844
                                                                • C:\Windows\system32\cmd.exe
                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\MnooYtihWnMJ.bat" "
                                                                  20⤵
                                                                    PID:2400
                                                                    • C:\Windows\system32\chcp.com
                                                                      chcp 65001
                                                                      21⤵
                                                                        PID:2656
                                                                      • C:\Windows\system32\PING.EXE
                                                                        ping -n 10 localhost
                                                                        21⤵
                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                        • Runs ping.exe
                                                                        PID:2672
                                                                      • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                                                        21⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:1560
                                                                        • C:\Windows\system32\cmd.exe
                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\2L5MtjTFL4Ex.bat" "
                                                                          22⤵
                                                                            PID:1604
                                                                            • C:\Windows\system32\chcp.com
                                                                              chcp 65001
                                                                              23⤵
                                                                                PID:2332
                                                                              • C:\Windows\system32\PING.EXE
                                                                                ping -n 10 localhost
                                                                                23⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Runs ping.exe
                                                                                PID:2156
                                                                              • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                                                                23⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:2184
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\PQS3scNtHQA1.bat" "
                                                                                  24⤵
                                                                                    PID:2760
                                                                                    • C:\Windows\system32\chcp.com
                                                                                      chcp 65001
                                                                                      25⤵
                                                                                        PID:1916
                                                                                      • C:\Windows\system32\PING.EXE
                                                                                        ping -n 10 localhost
                                                                                        25⤵
                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                        • Runs ping.exe
                                                                                        PID:1048
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
                                                                                        25⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        • Suspicious use of SendNotifyMessage
                                                                                        PID:1456

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\2L5MtjTFL4Ex.bat

                                        Filesize

                                        209B

                                        MD5

                                        da378557716132b0aa8b3bd518a6307f

                                        SHA1

                                        e062fb0bfdce3fb4f3a868266485ca7a1b5ea26d

                                        SHA256

                                        4789eed6592439c69337f528fd47804b1946649f7c31f7578b37dfcbf0ec5779

                                        SHA512

                                        2d9a6cbaba284be9d3e0b9bdc855ba4b1e0def46083dc55ba5c9dc52db61ed70ce19e7b0ad35cec09876d86f4c6bf7a2ea122f06abe15f5d732ac5fb1918c25c

                                      • C:\Users\Admin\AppData\Local\Temp\AMgpoKePxuAn.bat

                                        Filesize

                                        209B

                                        MD5

                                        c17a9b76f2db04b4893b79ce1af83f1e

                                        SHA1

                                        804261ea2a9a47d363405a2b283bf430781fd278

                                        SHA256

                                        71c797f1aa45433e7d0efd1af8352339836998a3d917c4671bcc320cc336377a

                                        SHA512

                                        6bbd69b30fc6411d6dc96e3ce089ff6e789800e682e34c159e169a1166d7f6a8eb621c807f488caa07f04dc78e3104e59339c361251ac27855ce9c323e327e88

                                      • C:\Users\Admin\AppData\Local\Temp\MnooYtihWnMJ.bat

                                        Filesize

                                        209B

                                        MD5

                                        2e177e174f2e36ba90b2a24af92f1a9b

                                        SHA1

                                        9752ea318b524ebb0a8b16ddf2bd6f23edc2a713

                                        SHA256

                                        3d74a33c1fdc260c8f31bfa4d53825d8f3fb7d055a0d7939883e509681704715

                                        SHA512

                                        6306a3878f679364bdaf4ca2d730c76b0e0653a1d52e4d554388ed999b8bb2e44225d7e297b48770e2fa606af45883a06050a21994fcd4c73e5ef08a8418bf9c

                                      • C:\Users\Admin\AppData\Local\Temp\PQS3scNtHQA1.bat

                                        Filesize

                                        209B

                                        MD5

                                        ab03b5f79716316639f7dd8d9d9ca9e0

                                        SHA1

                                        7b90dc46ae8b78a6a5313db27b4da7df1d5bd3e5

                                        SHA256

                                        542621fe808fccf3e6cc038d40600f8deb26fd26b8d17718235e312a25a5785b

                                        SHA512

                                        7680bfecac50f04def012747e0a79b75e48294872e41cab704b1b8c30d20b5f272a4544c155b9ce15cfcd94be6254fde03b162fdf4e688fd6d607b9eda234057

                                      • C:\Users\Admin\AppData\Local\Temp\S0gwlyjZ6j91.bat

                                        Filesize

                                        209B

                                        MD5

                                        42575db8a88d270b4ea847a6d90037de

                                        SHA1

                                        75b9f004351b9a6bdbd2cc5c7c680051117704f4

                                        SHA256

                                        2451c95a1acc4571e274851b34f89fb370a42009eef4723f6c671d33f3e9595b

                                        SHA512

                                        f9b2d2cdf1f52d39814344f14b8dd451b37dfc8c66aa429355c84618338c15e21f3bbb277846b10b7fe6cc94c4a70e23f36d6f4499f42d828fb7e58977e21429

                                      • C:\Users\Admin\AppData\Local\Temp\V1YeAGYcR3eS.bat

                                        Filesize

                                        209B

                                        MD5

                                        a619c1c755a95aea30485f4b1dbf7d1a

                                        SHA1

                                        7c14a586562c745a6709e36b1543a7bce8bab252

                                        SHA256

                                        fc58979a631f516a60b0cc609a40fccb47f228573df244185f066230dacd433d

                                        SHA512

                                        d6892d553f841a268d5f4132c0cd5e6dbf25b89b23b22bde9eaa299d0b90185b584f63d6f23dff542c7a45f15b118124014d1816f5abbcfd3c1f8bc0eb47abbf

                                      • C:\Users\Admin\AppData\Local\Temp\WCpa9OHAS6qJ.bat

                                        Filesize

                                        209B

                                        MD5

                                        3d07968773265bf86a1b23a2ae6420cc

                                        SHA1

                                        2c55b1330fe861d5b3867156d868a21cbc3e2347

                                        SHA256

                                        a15995cbe2d40e977e6a3b3ef5be44f1df09e00477a1bfe9924bd501a02e8ae0

                                        SHA512

                                        b266b7be50a79b04adfcd36b9d8a05666b79390387ebd169e50ebba77899d38b067186a6e0af677f573b8b5c74fa48c734e9c966e70486cd820dbc21210476b8

                                      • C:\Users\Admin\AppData\Local\Temp\a0PuT5uExt8t.bat

                                        Filesize

                                        209B

                                        MD5

                                        5b4b9d24cdd708ded6a7adab35dc30d9

                                        SHA1

                                        61e43b8c4a3d42a5f738f6ddf33a2cd691c32378

                                        SHA256

                                        5dd4dd1da4d43465a1468fbf4ea3603d7d03645a916f53af10441f38314c39c1

                                        SHA512

                                        b08290e6ba6df483c37529d02f102bd586019061613b7ff9c2cf011f66a4b852b06bb09f4b5e219c00d2db2da7de70c7163a9e9bd9013e56aae484062bef1117

                                      • C:\Users\Admin\AppData\Local\Temp\k2dNWozKZ2BH.bat

                                        Filesize

                                        209B

                                        MD5

                                        b4ac2e0add678b2cc8d0889f20969e53

                                        SHA1

                                        04c8c55f9ce55ff637ab1f9432605a3dd14dfbe6

                                        SHA256

                                        0ed58421930a275ce5aa47222270b82b4745d07f78ba60965d84365fc399a7bb

                                        SHA512

                                        a4c495ac6e6a721b90199dfc7091235db80fa07244441e5d5476715171bff467d75da1a895e25a7ac96e7467139595183ebaea08db05bd0d3d47e6a7f2f2fcf9

                                      • C:\Users\Admin\AppData\Local\Temp\xZkBJ5I2KqoL.bat

                                        Filesize

                                        209B

                                        MD5

                                        1fe34107ffdaf3b0cff19c04852f0cf1

                                        SHA1

                                        b3a014f778c63abe13e19aef314ff8344a358328

                                        SHA256

                                        47c6b06dd19a4b1b7f297b20bcdf86b623c84a2b188329ebbda64e545893c8ab

                                        SHA512

                                        716a088b2e44739980f4e2a7e6039257dec0ded3339a47ec6fdfa77117d3deac32a8c013dfdee949c56cab31be23ff596aaa6c8a6888a3c1ce9f550eb426e601

                                      • C:\Users\Admin\AppData\Local\Temp\xcPzQzBt2Jgr.bat

                                        Filesize

                                        209B

                                        MD5

                                        30e818dbb1d4ba1c959af3970525e669

                                        SHA1

                                        47edabbb5fa7a9090844bee10fe33a1ade71dd27

                                        SHA256

                                        e9ea70bc79b6f8ea87a0b0ec6acff1de1f8eb5b3a0033be8f709f7539ce119e8

                                        SHA512

                                        7ddbdd8acf7092256d5b1df4f96853e02d8769b6ac55204975ad253bd6e87ada600d79b214c6978e22ae7fd87efcdc49055ff1554c0a0f3f84b3227ffff21247

                                      • C:\Users\Admin\AppData\Local\Temp\yl37B9K7jxRR.bat

                                        Filesize

                                        209B

                                        MD5

                                        0b9342eebc2b697753ae7a9560627c56

                                        SHA1

                                        db32cd06c0ce114a6efb070584db1acb9fa2d1e8

                                        SHA256

                                        ff588b7c22fe24af679b81000d624f976c6e7e53c6a559c10740f7af6e39de32

                                        SHA512

                                        9b859afc1ff19167a6a0c29063adacd15848ff53c33f2f2edcb85e5b857946d5f0b80378637d51a34093f367a27c638393c2d5e5450c2ddf12f825e3e7e2d7c2

                                      • memory/844-62-0x0000000000FA0000-0x00000000012C4000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/1308-0-0x000007FEF5AF3000-0x000007FEF5AF4000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/1308-11-0x000007FEF5AF0000-0x000007FEF64DC000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/1308-2-0x000007FEF5AF0000-0x000007FEF64DC000-memory.dmp

                                        Filesize

                                        9.9MB

                                      • memory/1308-1-0x0000000000FB0000-0x00000000012D4000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/2176-33-0x00000000000F0000-0x0000000000414000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/2352-23-0x00000000003A0000-0x00000000006C4000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/2464-43-0x0000000000F30000-0x0000000001254000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/2808-81-0x00000000012A0000-0x00000000015C4000-memory.dmp

                                        Filesize

                                        3.1MB

                                      • memory/2820-13-0x0000000001080000-0x00000000013A4000-memory.dmp

                                        Filesize

                                        3.1MB