Analysis
-
max time kernel
4s -
max time network
5s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/12/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
image/image.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
image/image.png.lnk
Resource
win11-20241007-en
General
-
Target
image/image.exe
-
Size
1.5MB
-
MD5
bbb68cbd54b244a4248bd6f0679248cd
-
SHA1
8f5b4de5be86fb25b771cb6d77d7c733d61425fe
-
SHA256
bbd6a97147359f874c0d8cad57adaf14508890a1fdeb7a71b94a2957a81786d5
-
SHA512
99bc221b3134b37f42a7879382f88367ba365689620aebb7f64e5e11b136885761f7dd1801fafe57b94418af38020fc12cc7df0a9ef6419ea0c3e2f78127471d
-
SSDEEP
24576:luDXTIGaPhEYzUzA0KugmRyyi8xDjtF24u0+I3dlB9wgTwB/aqBLIXvFpNvKcYjg:4Djlabwz9Am4FijqfEdlB9dTwB/aqBED
Malware Config
Extracted
quasar
1.4.1
kurban
am2uk98.localto.net:1717
29f4cb4d-448a-4713-bbeb-b28f62c6efe4
-
encryption_key
5D6738D4B8B3079082A977FDF5631438E56AC0F9
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
quasar
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x001d00000002aae0-6.dat family_quasar behavioral1/memory/2352-15-0x00000000007B0000-0x0000000000AD4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2352 Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1672 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2352 Client-built.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2352 1864 image.exe 78 PID 1864 wrote to memory of 2352 1864 image.exe 78 PID 2352 wrote to memory of 1672 2352 Client-built.exe 81 PID 2352 wrote to memory of 1672 2352 Client-built.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\image\image.exe"C:\Users\Admin\AppData\Local\Temp\image\image.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "quasar" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5709db99b201db278f9dd2375efd249fb
SHA1bcd7a699982f840f90e38543aff9dcad5dc35a75
SHA2562c4a5c66e2c741be6d4211f46c4c03ffc1e7500326924c2d6eb3e7dc5ae51362
SHA51218ef7c998e9a229e30a34ec6d1800c572292faa2845b3187b63ca8e72caed03b21f88f000ced25ad2d0e0bd19ad0b554cf62749096cab414a70e06d9c817a4ba