Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    885s
  • max time network
    895s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 03:47

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    06852863597eb1bd83b37bb3b41c98d5

  • SHA1

    d11647b959e42ea8d5faa39db64410e529935176

  • SHA256

    a46695be041bc840e85bfe04c10149437ebf8a756aa1a000e8cb27b99b88eb74

  • SHA512

    9cecea8664556ba436b6e8d6d1b5fdcd6bb72a86ab6d697f663fe6f215e4fe0bf3e4b893fa88a5495fdd814e4567348cd2c92564894f1d6914b54b9de8060c6c

  • SSDEEP

    49152:WvbI22SsaNYfdPBldt698dBcjHts9qBbR0LoGdYCTHHB72eh2NT:Wvk22SsaNYfdPBldt6+dBcjHtSqi

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

172.19.176.1:4782

Mutex

5ff21f42-29bb-4f39-8330-d7b25899e244

Attributes
  • encryption_key

    5FA29404115DC34E66E4C1BC971398B0B301D072

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/644-0-0x000007FEF5C83000-0x000007FEF5C84000-memory.dmp

    Filesize

    4KB

  • memory/644-1-0x0000000000AD0000-0x0000000000DF4000-memory.dmp

    Filesize

    3.1MB

  • memory/644-2-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/644-3-0x000007FEF5C83000-0x000007FEF5C84000-memory.dmp

    Filesize

    4KB

  • memory/644-4-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB