Resubmissions

22-12-2024 02:36

241222-c3x8xsznby 10

22-12-2024 02:36

241222-c3ndqazna1 10

22-12-2024 02:34

241222-c2nyvszpek 10

Analysis

  • max time kernel
    79s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 02:34

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    455889b66765b1638dd978a0280f1c7e

  • SHA1

    774c78b88528e366cb46ba6723f7bbc7dbb192c1

  • SHA256

    4ad66f08167a301d51c613fa49c846297787a2fbc57d526c4885b419f61bb78f

  • SHA512

    df5c6d8615e1f41f4d908b62f052805ee8b9dd50d129a9ae2da66888cb60b985a841b00f74090c436e05d6b26672d6fc9957a551cbbf30d91a2af4d5d81e3d3e

  • SSDEEP

    49152:avBt62XlaSFNWPjljiFa2RoUYIWXhymzg8oGd5ZTHHB72eh2NT:avr62XlaSFNWPjljiFXRoUYIWXhnp

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

JJ:4782

192.168.10.1:4782

Mutex

9a10c5be-59aa-4915-9bd2-d92256f2c938

Attributes
  • encryption_key

    83ADBC9532F819159CF9138DCD18B9BF646C2117

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Discord

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 8 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 7 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3032
    • C:\Windows\system32\SubDir\Client.exe
      "C:\Windows\system32\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2208
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\JCRFR6uGHNH2.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2724
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2264
          • C:\Windows\system32\SubDir\Client.exe
            "C:\Windows\system32\SubDir\Client.exe"
            4⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\system32\schtasks.exe
              "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2640
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\MQ0z5b9mHZMe.bat" "
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3048
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:3020
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:696
                • C:\Windows\system32\SubDir\Client.exe
                  "C:\Windows\system32\SubDir\Client.exe"
                  6⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1652
                  • C:\Windows\system32\schtasks.exe
                    "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                    7⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:1856
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\dMdFvF6zrGHZ.bat" "
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1964
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      8⤵
                        PID:2144
                      • C:\Windows\system32\PING.EXE
                        ping -n 10 localhost
                        8⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2116
                      • C:\Windows\system32\SubDir\Client.exe
                        "C:\Windows\system32\SubDir\Client.exe"
                        8⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2028
                        • C:\Windows\system32\schtasks.exe
                          "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                          9⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:1996
                        • C:\Windows\system32\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\c36tOAWDZCAm.bat" "
                          9⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2652
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            10⤵
                              PID:2100
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              10⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:1376
                            • C:\Windows\system32\SubDir\Client.exe
                              "C:\Windows\system32\SubDir\Client.exe"
                              10⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:2172
                              • C:\Windows\system32\schtasks.exe
                                "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                11⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:2632
                              • C:\Windows\system32\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\yEjwvqvq9TaB.bat" "
                                11⤵
                                  PID:2516
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    12⤵
                                      PID:1360
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      12⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:1584
                                    • C:\Windows\system32\SubDir\Client.exe
                                      "C:\Windows\system32\SubDir\Client.exe"
                                      12⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2152
                                      • C:\Windows\system32\schtasks.exe
                                        "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                        13⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:2768
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\B4yGCPFwKt6L.bat" "
                                        13⤵
                                          PID:832
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            14⤵
                                              PID:2148
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              14⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:2948
                                            • C:\Windows\system32\SubDir\Client.exe
                                              "C:\Windows\system32\SubDir\Client.exe"
                                              14⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2320
                                              • C:\Windows\system32\schtasks.exe
                                                "schtasks" /create /tn "Discord" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                15⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2052
                                              • C:\Windows\system32\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\wEugoKbW6TiB.bat" "
                                                15⤵
                                                  PID:2312
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    16⤵
                                                      PID:1092
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 10 localhost
                                                      16⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      • Runs ping.exe
                                                      PID:1556

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\B4yGCPFwKt6L.bat

                        Filesize

                        196B

                        MD5

                        c45c9be151a5029cc98b7f0dcf5bdae8

                        SHA1

                        55fc796c305b2ce4905e9f887bda987d374b60f3

                        SHA256

                        485d98b5fc156d019dce9fe3c97038ccd42db30664e2dfc154c54c303f46bd3e

                        SHA512

                        e2ccc716ce7245125fb27d3f56dd2bec7dbaa8d85f69e99fe6f0d011f319784b214f9bd07aaafed9977051a68e4a855d59cfaa790dd5ca67c9a5390aa72b9817

                      • C:\Users\Admin\AppData\Local\Temp\JCRFR6uGHNH2.bat

                        Filesize

                        196B

                        MD5

                        ade1f7586c027a2b8f7f41aedebf7c3d

                        SHA1

                        7cd97c7dc2121c69dbcf8963304bc284a846d880

                        SHA256

                        8ef1c3259f17f5347604bd66823ceca5cc9a74fb63d2771d082b559bb0e573a8

                        SHA512

                        33b990bb269698adaf9527b2cc02549b23883cc251d647cb0d011106bb12fc0529817c224340195a6117d5d8d82493d013f0668cca2c27591112b78ddbc2e926

                      • C:\Users\Admin\AppData\Local\Temp\MQ0z5b9mHZMe.bat

                        Filesize

                        196B

                        MD5

                        b5187b896233276672c942139e4a83b9

                        SHA1

                        c01f6ebc27c58668a7da795567d4a085fb80a0c0

                        SHA256

                        64a38c88bf50c7d6b5a6521fe5815a00f0e84e4c33c0e49c3268a3d8b84cee8d

                        SHA512

                        9ad753c7c2b7d1dd65ed28be44897a615b015cff40713ca3fed402ca285c4b1b26f4443b81464bbe425319b581677e7fa1b90562d463c41b5e9c1536fe6dc772

                      • C:\Users\Admin\AppData\Local\Temp\c36tOAWDZCAm.bat

                        Filesize

                        196B

                        MD5

                        7007be9c8b528b1b961b031a10999fcc

                        SHA1

                        3eef9bba943735bb579c1115b666eca5df558fbe

                        SHA256

                        948e22d5e2ba2cd36d0ef13317a72bc59e6091a6de394c2cd3e5415db1839a61

                        SHA512

                        5f82ec4503af65e839053da6777d78fe34b8ea7cf125fbdc92c7af64fedfb4a080603395adbbdcacc9a8823ed14a94541911a2fa7c4c8166d17a20fdd74e1b66

                      • C:\Users\Admin\AppData\Local\Temp\dMdFvF6zrGHZ.bat

                        Filesize

                        196B

                        MD5

                        a55c203103868e7d7157cfc5b827e151

                        SHA1

                        005db4b8340f3483958448aa28f2860d73bbeeaa

                        SHA256

                        543c87aedc05615c553887c9b4277aea317ce1ecd170e6dc1924b4a2aadd67f3

                        SHA512

                        fcc1245be89dd260c0cfe94ee05f75e1407a3ad9074f9ae5a7a65afbf94139b096b3e87b1dbe9562ea2445415b35e6c2f4f00d97e608b86f6962160cc79231d6

                      • C:\Users\Admin\AppData\Local\Temp\wEugoKbW6TiB.bat

                        Filesize

                        196B

                        MD5

                        8561989a1759f663c8ef19154fe5c5dd

                        SHA1

                        cbbd3ed3b54c941a633b87aaaee36e59f2e3a99d

                        SHA256

                        f7c032f8f4e953357b168cfb363e3242bd62d71a95e768bb076950d39cbc97a9

                        SHA512

                        31d67e6b6638e961ff87cfd07020ee690c1607096aa4902ebbe42d19003c70115e5fd94605b2f65d25533812d321325cbb039539ec8929b7d5fd4093457769ae

                      • C:\Users\Admin\AppData\Local\Temp\yEjwvqvq9TaB.bat

                        Filesize

                        196B

                        MD5

                        28c6c07414b7d86601915511c6bed4aa

                        SHA1

                        8bf80f5ae8257d12b1b05404e2e55a6bbe1db685

                        SHA256

                        0e7489bdb56e4f6e6bf7e7f2025e1e59603a87e09df1bc8a667613c444fb857e

                        SHA512

                        4c7961bb8a3753001e29cb297653ea91c1a057a5ed27be4c3c170cb9046b13f576e5ef08a9b64db6d733f79f006c8183d21569768b4a78e3e1bb5fda1756e19f

                      • C:\Windows\System32\SubDir\Client.exe

                        Filesize

                        3.1MB

                        MD5

                        455889b66765b1638dd978a0280f1c7e

                        SHA1

                        774c78b88528e366cb46ba6723f7bbc7dbb192c1

                        SHA256

                        4ad66f08167a301d51c613fa49c846297787a2fbc57d526c4885b419f61bb78f

                        SHA512

                        df5c6d8615e1f41f4d908b62f052805ee8b9dd50d129a9ae2da66888cb60b985a841b00f74090c436e05d6b26672d6fc9957a551cbbf30d91a2af4d5d81e3d3e

                      • memory/1652-34-0x0000000001240000-0x0000000001564000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2028-46-0x0000000000240000-0x0000000000564000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2124-9-0x00000000012E0000-0x0000000001604000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2124-20-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2124-11-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2124-10-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2172-57-0x0000000000EA0000-0x00000000011C4000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2320-79-0x0000000000ED0000-0x00000000011F4000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2384-8-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2384-0-0x000007FEF5573000-0x000007FEF5574000-memory.dmp

                        Filesize

                        4KB

                      • memory/2384-2-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2384-1-0x0000000001200000-0x0000000001524000-memory.dmp

                        Filesize

                        3.1MB

                      • memory/2616-23-0x0000000000140000-0x0000000000464000-memory.dmp

                        Filesize

                        3.1MB