Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 11:15

General

  • Target

    truepepe-qt.exe

  • Size

    85.2MB

  • MD5

    157a22896cc610d6310a2fa0f4a13005

  • SHA1

    5e62076cad33e22d62413264113627114cbc8887

  • SHA256

    af12a0fe7ac38dc5fe35e9bc07e2c4e94b52fb895fde35991f77477519991562

  • SHA512

    1eba39a21c01950a12e78582e99253a48b3984564c4826890a577b849abfde20f3012eeea4a0c972f94faa153ba6aef90af57b8d0762b0920cf6a940ccd86b75

  • SSDEEP

    393216:34TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa25:3KRVQxhu0P8Lq1LEvxOOx5Sv

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

SenshiPepe

C2

51.15.17.193:4782

Mutex

3cedc6f6-6ab5-4aba-8d7d-5cda1b7ffa72

Attributes
  • encryption_key

    97599F6E5D14A784CC4DD36B18A277119042FDA8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • System Binary Proxy Execution: Regsvcs/Regasm 1 TTPs 2 IoCs

    Abuse Regasm to proxy execution of malicious code.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\truepepe-qt.exe
    "C:\Users\Admin\AppData\Local\Temp\truepepe-qt.exe"
    1⤵
    • System Binary Proxy Execution: Regsvcs/Regasm
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "type C:\Users\Admin\AppData\Local\Temp\temp.ps1 | powershell.exe -noprofile -"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\temp.ps1 "
        3⤵
          PID:4652
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -noprofile -
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1080
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0hmbn0lb\0hmbn0lb.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1820
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBBDE.tmp" "c:\Users\Admin\AppData\Local\Temp\0hmbn0lb\CSC3B82DDB6E4E4D7CB7B28E8E23CABF.TMP"
              5⤵
                PID:2812
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"
          2⤵
          • System Binary Proxy Execution: Regsvcs/Regasm
          • Suspicious use of WriteProcessMemory
          PID:2932
          • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
            C:\Users\Admin\AppData\Local\Temp\RegAsm.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:5036
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\TruePepe.exe"
          2⤵
            PID:2984

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\0hmbn0lb\0hmbn0lb.dll

          Filesize

          3KB

          MD5

          daf9f45d1e8e1f0fd406ffd288cbf3da

          SHA1

          ebea39b84f711bd3e7e18fdeeff807a3946c68a7

          SHA256

          2ad68978f93c6740f3c2a0706f9bcc2c5116420ef14c907196b6fdcc152b5daf

          SHA512

          c691f12f505cdef58b44f5ceb807f199ee02e328cb05c5c004543bfe87adec03f88bf558f7325d9e514ecd11506bd4091d05cf98a0203bda8b25a7a9083b76ae

        • C:\Users\Admin\AppData\Local\Temp\RESBBDE.tmp

          Filesize

          1KB

          MD5

          b91fc7a87608fcb9bf21e63244163138

          SHA1

          16ac4c985493cb0f9d4e6d6cf985431629090e87

          SHA256

          7b8eb3172cc5c65448fe133ec9bf08defae1aaa167074506efda4ffce5934556

          SHA512

          2e903322af2a5647d920ff9848936430445003c403419564751e7ec72693db7a0be53b0c0b58c2401d763dd437cb1c8594df0e95e5567fbb921eb38635455578

        • C:\Users\Admin\AppData\Local\Temp\RegAsm.exe

          Filesize

          5.5MB

          MD5

          68ca89f542a3e864fe99e2391b178e22

          SHA1

          0ee003ff3b991f0c18e6b3d00f5e7f146ad2b746

          SHA256

          8b2c157588514f8e5210a12c54e5e723cc3d92b0c5b7a30e8343aec6d33837d8

          SHA512

          c411060d308d6294687e8590f303e9b2401f881410ff6051cb5d38ade8522ec99975bd8f123705c441021c6932dc2e95a0393e15b44254a738ebfbad8882997a

        • C:\Users\Admin\AppData\Local\Temp\TruePepe.exe

          Filesize

          4KB

          MD5

          b649bb4bbcec6444434d2df7501effb6

          SHA1

          f8a04ac654e2234fa2644abf8e293d02bc01c8fd

          SHA256

          c2779250c7e25bb12281a890f3ec61c3585c5bbad82fbbb55a3068191004fc4a

          SHA512

          7265c870e9d51cd6f4936860ec4443ae21754634997be1294bd17c8cbe0c23dba56e730bcacecfa73f5b305fbefaf5b75e2747dfd3cd83cfe6b416ac8cc7ecf2

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ghzascdu.orm.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\temp.ps1

          Filesize

          379B

          MD5

          18047e197c6820559730d01035b2955a

          SHA1

          277179be54bba04c0863aebd496f53b129d47464

          SHA256

          348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3

          SHA512

          1942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877

        • \??\c:\Users\Admin\AppData\Local\Temp\0hmbn0lb\0hmbn0lb.0.cs

          Filesize

          311B

          MD5

          7bc8de6ac8041186ed68c07205656943

          SHA1

          673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75

          SHA256

          36865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697

          SHA512

          0495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba

        • \??\c:\Users\Admin\AppData\Local\Temp\0hmbn0lb\0hmbn0lb.cmdline

          Filesize

          369B

          MD5

          684bd7cb5a45659c9309602ad551badf

          SHA1

          e643186dbb53e1770d107ec1094acfdfd36a5570

          SHA256

          4d83596ff69ab617516f39777d2bfa9a760d4fc441899ac5e499d76fbd2bd6fb

          SHA512

          32745d62f6f5cb296090976f6601b7fe5aaa07c8122138c4e3f1253907fa10e6e2d019107569eca37cd01f8c9b15fe21461d85bd8a2742fa5edf5c38576d6c74

        • \??\c:\Users\Admin\AppData\Local\Temp\0hmbn0lb\CSC3B82DDB6E4E4D7CB7B28E8E23CABF.TMP

          Filesize

          652B

          MD5

          c373b15939489915dd535741f37f182d

          SHA1

          4d6295b85f34dcebac2b1ac93207974c14d04c38

          SHA256

          5d0d430701176ebdf03a770ff0423ced1ac493cc10fb2e4375cfdacb4d1154e3

          SHA512

          8646a4d4c382ed19146db85453999319c77debc1c4eddd2dc1e28b4e2147a278104d20ca34e758478d9229bb6acb906f47fdefd341c4e77cb9491321d5cd48e7

        • memory/1080-27-0x0000021FAD310000-0x0000021FAD318000-memory.dmp

          Filesize

          32KB

        • memory/1080-14-0x0000021FAD750000-0x0000021FAD7C6000-memory.dmp

          Filesize

          472KB

        • memory/1080-3-0x0000021FAD190000-0x0000021FAD1B2000-memory.dmp

          Filesize

          136KB

        • memory/1080-13-0x0000021FAD330000-0x0000021FAD374000-memory.dmp

          Filesize

          272KB

        • memory/5036-39-0x000001EC39830000-0x000001EC39B54000-memory.dmp

          Filesize

          3.1MB

        • memory/5036-40-0x000001EC20830000-0x000001EC20880000-memory.dmp

          Filesize

          320KB

        • memory/5036-41-0x000001EC3A160000-0x000001EC3A212000-memory.dmp

          Filesize

          712KB

        • memory/5036-44-0x000001EC208F0000-0x000001EC20902000-memory.dmp

          Filesize

          72KB

        • memory/5036-45-0x000001EC39250000-0x000001EC3928C000-memory.dmp

          Filesize

          240KB