Analysis

  • max time kernel
    4s
  • max time network
    5s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/12/2024, 17:56

General

  • Target

    image/image.exe

  • Size

    1.5MB

  • MD5

    bbb68cbd54b244a4248bd6f0679248cd

  • SHA1

    8f5b4de5be86fb25b771cb6d77d7c733d61425fe

  • SHA256

    bbd6a97147359f874c0d8cad57adaf14508890a1fdeb7a71b94a2957a81786d5

  • SHA512

    99bc221b3134b37f42a7879382f88367ba365689620aebb7f64e5e11b136885761f7dd1801fafe57b94418af38020fc12cc7df0a9ef6419ea0c3e2f78127471d

  • SSDEEP

    24576:luDXTIGaPhEYzUzA0KugmRyyi8xDjtF24u0+I3dlB9wgTwB/aqBLIXvFpNvKcYjg:4Djlabwz9Am4FijqfEdlB9dTwB/aqBED

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

kurban

C2

am2uk98.localto.net:1717

Mutex

29f4cb4d-448a-4713-bbeb-b28f62c6efe4

Attributes
  • encryption_key

    5D6738D4B8B3079082A977FDF5631438E56AC0F9

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    quasar

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\image\image.exe
    "C:\Users\Admin\AppData\Local\Temp\image\image.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "quasar" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

          Filesize

          3.1MB

          MD5

          709db99b201db278f9dd2375efd249fb

          SHA1

          bcd7a699982f840f90e38543aff9dcad5dc35a75

          SHA256

          2c4a5c66e2c741be6d4211f46c4c03ffc1e7500326924c2d6eb3e7dc5ae51362

          SHA512

          18ef7c998e9a229e30a34ec6d1800c572292faa2845b3187b63ca8e72caed03b21f88f000ced25ad2d0e0bd19ad0b554cf62749096cab414a70e06d9c817a4ba

        • memory/2352-14-0x00007FFC55473000-0x00007FFC55475000-memory.dmp

          Filesize

          8KB

        • memory/2352-15-0x00000000007B0000-0x0000000000AD4000-memory.dmp

          Filesize

          3.1MB

        • memory/2352-16-0x00007FFC55470000-0x00007FFC55F32000-memory.dmp

          Filesize

          10.8MB

        • memory/2352-17-0x000000001C230000-0x000000001C280000-memory.dmp

          Filesize

          320KB

        • memory/2352-18-0x000000001C340000-0x000000001C3F2000-memory.dmp

          Filesize

          712KB