Analysis

  • max time kernel
    87s
  • max time network
    88s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-12-2024 09:23

General

  • Target

    Seron_protected.exe

  • Size

    2.3MB

  • MD5

    a1e7539d32cd463c86540e00607e274b

  • SHA1

    537b182c080ddd6fa8e89b31d67297abf7aef554

  • SHA256

    828b9961731797b0a487f095d9980d3771599eb54feab35d1e856b925558e61a

  • SHA512

    33c8ff00732e04a360c57aef401467f54a649563c5820c81c19b5de1607102bd9c29c65ca4f8c914885a0031b0c415339efa01122fbda58e17d8ff632d48b567

  • SSDEEP

    49152:M55We0VQ+028J5gyUjjp5bCt7S275L6MP/J2H76gYSt98H9Y08ChNB/n:M55We0VCN6jjp5bC5Ft6MX4H76XStCdz

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Seron

C2

nigeboc465-58875.portmap.host:58875

Mutex

eb8602ec-8a0d-4322-b9a0-544571be5a2d

Attributes
  • encryption_key

    8BD9150EEC3DA71ED82080D7AEB7C165A58C889F

  • install_name

    f8mk7ZGwVUpulm.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    f8mk7ZGwVUpulm

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Seron_protected.exe
    "C:\Users\Admin\AppData\Local\Temp\Seron_protected.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5348
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks" /create /tn "f8mk7ZGwVUpulm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe" /rl HIGHEST /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:5984
    • C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "f8mk7ZGwVUpulm" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe" /rl HIGHEST /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SubDir\f8mk7ZGwVUpulm.exe

    Filesize

    2.3MB

    MD5

    a1e7539d32cd463c86540e00607e274b

    SHA1

    537b182c080ddd6fa8e89b31d67297abf7aef554

    SHA256

    828b9961731797b0a487f095d9980d3771599eb54feab35d1e856b925558e61a

    SHA512

    33c8ff00732e04a360c57aef401467f54a649563c5820c81c19b5de1607102bd9c29c65ca4f8c914885a0031b0c415339efa01122fbda58e17d8ff632d48b567

  • memory/1924-33-0x0000000074060000-0x0000000074811000-memory.dmp

    Filesize

    7.7MB

  • memory/1924-30-0x0000000077874000-0x0000000077875000-memory.dmp

    Filesize

    4KB

  • memory/1924-40-0x000000000B970000-0x000000000B982000-memory.dmp

    Filesize

    72KB

  • memory/1924-37-0x000000000A420000-0x000000000A4D2000-memory.dmp

    Filesize

    712KB

  • memory/1924-36-0x000000000A1B0000-0x000000000A200000-memory.dmp

    Filesize

    320KB

  • memory/1924-35-0x000000000A700000-0x000000000AD18000-memory.dmp

    Filesize

    6.1MB

  • memory/1924-41-0x000000000B9D0000-0x000000000BA0C000-memory.dmp

    Filesize

    240KB

  • memory/1924-32-0x0000000000C60000-0x0000000001334000-memory.dmp

    Filesize

    6.8MB

  • memory/1924-34-0x0000000000C60000-0x0000000001334000-memory.dmp

    Filesize

    6.8MB

  • memory/1924-42-0x000000000BA80000-0x000000000BAE6000-memory.dmp

    Filesize

    408KB

  • memory/1924-22-0x0000000000C60000-0x0000000001334000-memory.dmp

    Filesize

    6.8MB

  • memory/1924-31-0x000000007406E000-0x000000007406F000-memory.dmp

    Filesize

    4KB

  • memory/1924-26-0x0000000001AF0000-0x0000000001AF1000-memory.dmp

    Filesize

    4KB

  • memory/1924-29-0x0000000000C60000-0x0000000001334000-memory.dmp

    Filesize

    6.8MB

  • memory/1924-28-0x0000000000C60000-0x0000000001334000-memory.dmp

    Filesize

    6.8MB

  • memory/5348-14-0x0000000009060000-0x00000000090F2000-memory.dmp

    Filesize

    584KB

  • memory/5348-27-0x0000000074060000-0x0000000074811000-memory.dmp

    Filesize

    7.7MB

  • memory/5348-25-0x0000000000380000-0x0000000000A54000-memory.dmp

    Filesize

    6.8MB

  • memory/5348-16-0x0000000008FA0000-0x0000000008FAA000-memory.dmp

    Filesize

    40KB

  • memory/5348-15-0x0000000074060000-0x0000000074811000-memory.dmp

    Filesize

    7.7MB

  • memory/5348-0-0x0000000000380000-0x0000000000A54000-memory.dmp

    Filesize

    6.8MB

  • memory/5348-13-0x0000000009490000-0x0000000009A36000-memory.dmp

    Filesize

    5.6MB

  • memory/5348-12-0x0000000000380000-0x0000000000A54000-memory.dmp

    Filesize

    6.8MB

  • memory/5348-11-0x000000007406E000-0x000000007406F000-memory.dmp

    Filesize

    4KB

  • memory/5348-10-0x0000000077874000-0x0000000077875000-memory.dmp

    Filesize

    4KB

  • memory/5348-2-0x0000000000380000-0x0000000000A54000-memory.dmp

    Filesize

    6.8MB

  • memory/5348-1-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB