Analysis

  • max time kernel
    125s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 07:18

General

  • Target

    CollosalLoader.exe

  • Size

    3.4MB

  • MD5

    9a1361570008e75a9a8c6c93b8ea9a68

  • SHA1

    66852a8ff188d2003cb0a5c5b3b6d7659719c18c

  • SHA256

    516e463e2ea077d24cf12f4e3d8a886b99948497cb2eb1fe9a73ca0d61eea32e

  • SHA512

    88c39ba29172e236eaa32c1ac531975dc952d36556b7f3d3eb2faa3c9ffe0a39f7f3e4b2a1ae22664f86df41fddef5046d9ded2b522bd9848e5aaa58170889d5

  • SSDEEP

    49152:GvblL26AaNeWgPhlmVqvMQ7XSKidzYAfqoGd7THHB72eh2NT:GvBL26AaNeWgPhlmVqkQ7XSK4zYAy

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

70.34.210.80:4782

192.168.1.203:4782

Mutex

0d965223-b478-41be-af32-ad5a13d78eba

Attributes
  • encryption_key

    EBD92C218F947CFB9F2E27885F8DFFEAE9079F05

  • install_name

    MSWinpreference.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Skype

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\CollosalLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\CollosalLoader.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "Skype" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MSWinpreference.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2512
    • C:\Users\Admin\AppData\Roaming\SubDir\MSWinpreference.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\MSWinpreference.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Skype" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MSWinpreference.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SubDir\MSWinpreference.exe

    Filesize

    3.4MB

    MD5

    9a1361570008e75a9a8c6c93b8ea9a68

    SHA1

    66852a8ff188d2003cb0a5c5b3b6d7659719c18c

    SHA256

    516e463e2ea077d24cf12f4e3d8a886b99948497cb2eb1fe9a73ca0d61eea32e

    SHA512

    88c39ba29172e236eaa32c1ac531975dc952d36556b7f3d3eb2faa3c9ffe0a39f7f3e4b2a1ae22664f86df41fddef5046d9ded2b522bd9848e5aaa58170889d5

  • memory/2220-0-0x000007FEF6103000-0x000007FEF6104000-memory.dmp

    Filesize

    4KB

  • memory/2220-1-0x0000000000BA0000-0x0000000000F06000-memory.dmp

    Filesize

    3.4MB

  • memory/2220-2-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2220-8-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2324-9-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2324-10-0x0000000000D30000-0x0000000001096000-memory.dmp

    Filesize

    3.4MB

  • memory/2324-11-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2324-12-0x000007FEF6100000-0x000007FEF6AEC000-memory.dmp

    Filesize

    9.9MB