Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/12/2024, 19:31 UTC

General

  • Target

    honestly/MyPcGonnaExplode - Copy (103) - Copy - Copy - Copy.exe

  • Size

    3.1MB

  • MD5

    e35e3f1f51f82cb73c7b70451878c263

  • SHA1

    764f6f6c17c5e3e3b88513975c94d635842f1bd8

  • SHA256

    58606efb4cc178df08094a25618cda8a117ee7b06371f2d8ac980bd218d013c9

  • SHA512

    5fcdfd52eb1dd60542563338ec240d4981a25d157d3fbc96be55706f950f48c6433ed87225ac9311308094954227bdca983a11c91472c5c29b860b48be24815b

  • SSDEEP

    49152:PvyI22SsaNYfdPBldt698dBcjHjGVv9ToGdxTHHB72eh2NT:Pvf22SsaNYfdPBldt6+dBcjHjGVvp

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

test

C2

91.109.178.8:7070

Mutex

d933480a-c837-40f6-9fb3-c6401087e068

Attributes
  • encryption_key

    2C0C62BDD42E42BC77F98F8E1EE713B43F791267

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\honestly\MyPcGonnaExplode - Copy (103) - Copy - Copy - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\honestly\MyPcGonnaExplode - Copy (103) - Copy - Copy - Copy.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1292
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:208

Network

  • flag-us
    DNS
    217.106.137.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.106.137.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    14.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    241.150.49.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    241.150.49.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    28.73.42.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    28.73.42.20.in-addr.arpa
    IN PTR
    Response
  • 91.109.178.8:7070
    Client.exe
    260 B
    5
  • 91.109.178.8:7070
    Client.exe
    260 B
    5
  • 91.109.178.8:7070
    Client.exe
    260 B
    5
  • 91.109.178.8:7070
    Client.exe
    260 B
    5
  • 91.109.178.8:7070
    Client.exe
    260 B
    5
  • 91.109.178.8:7070
    Client.exe
    260 B
    5
  • 91.109.178.8:7070
    Client.exe
    52 B
    1
  • 8.8.8.8:53
    217.106.137.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    217.106.137.52.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    14.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    241.150.49.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    241.150.49.20.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.227.111.52.in-addr.arpa

  • 8.8.8.8:53
    28.73.42.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    28.73.42.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

    Filesize

    3.1MB

    MD5

    e35e3f1f51f82cb73c7b70451878c263

    SHA1

    764f6f6c17c5e3e3b88513975c94d635842f1bd8

    SHA256

    58606efb4cc178df08094a25618cda8a117ee7b06371f2d8ac980bd218d013c9

    SHA512

    5fcdfd52eb1dd60542563338ec240d4981a25d157d3fbc96be55706f950f48c6433ed87225ac9311308094954227bdca983a11c91472c5c29b860b48be24815b

  • memory/1284-0-0x00007FFCFC803000-0x00007FFCFC805000-memory.dmp

    Filesize

    8KB

  • memory/1284-1-0x00000000006D0000-0x00000000009F4000-memory.dmp

    Filesize

    3.1MB

  • memory/1284-2-0x00007FFCFC800000-0x00007FFCFD2C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1284-9-0x00007FFCFC800000-0x00007FFCFD2C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4772-10-0x00007FFCFC800000-0x00007FFCFD2C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4772-11-0x00007FFCFC800000-0x00007FFCFD2C1000-memory.dmp

    Filesize

    10.8MB

  • memory/4772-12-0x000000001BA50000-0x000000001BAA0000-memory.dmp

    Filesize

    320KB

  • memory/4772-13-0x000000001BB60000-0x000000001BC12000-memory.dmp

    Filesize

    712KB

  • memory/4772-14-0x00007FFCFC800000-0x00007FFCFD2C1000-memory.dmp

    Filesize

    10.8MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.