Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 00:43

General

  • Target

    832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105.exe

  • Size

    3.2MB

  • MD5

    a385e16864e1ac30f23dd08e87b93319

  • SHA1

    987c3448486e401936e928abc52cf80780fb2d37

  • SHA256

    832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105

  • SHA512

    e2099df125c1ca9dfbaddd6ec89dadf94fcce7dd8c298958a53a8b0d0e52d91c0b26f8d1746ec72d5527594d678ec19c29f4849994d268fbdb6200a5c13c7699

  • SSDEEP

    49152:tgviI22SsaNYfdPBldt698dBcjHq1SQoGv5lpTHHB72eh2NTf:mvv22SsaNYfdPBldt6+dBcjHq19x8

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

193.161.193.99:43242

Mutex

45bfb701-bea2-411a-948d-9a6abe001f83

Attributes
  • encryption_key

    80594967BC0A4839C316A44D62DE36E9BF18177F

  • install_name

    SYSTEM26.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105.exe
    "C:\Users\Admin\AppData\Local\Temp\832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2972
    • \??\c:\users\admin\appdata\local\temp\832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105.exe 
      c:\users\admin\appdata\local\temp\832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\SYSTEM26.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3944
      • C:\Users\Admin\AppData\Roaming\SubDir\SYSTEM26.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\SYSTEM26.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2280
        • \??\c:\users\admin\appdata\roaming\subdir\system26.exe 
          c:\users\admin\appdata\roaming\subdir\system26.exe 
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1932
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2968
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2284
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2784
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3856
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105.exe 

    Filesize

    3.1MB

    MD5

    be5735282826036dcacc522c081365a0

    SHA1

    310bba5786ba8a4087cb8045ea699279a434a818

    SHA256

    78fe9f9cac3e4d5cf653be4475c8f247d4803379365dd44320716ea7384a8c11

    SHA512

    0fecccb5dd1ecfc0eba3dc89e078b2210ea6299d0f60cdd7bade885872cd07f6bbf041b98924054b71d35d94e56e3004ac825c5f2f9feb7f18758fad25c3b2f3

  • C:\Users\Admin\AppData\Roaming\SubDir\SYSTEM26.exe

    Filesize

    3.2MB

    MD5

    a385e16864e1ac30f23dd08e87b93319

    SHA1

    987c3448486e401936e928abc52cf80780fb2d37

    SHA256

    832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105

    SHA512

    e2099df125c1ca9dfbaddd6ec89dadf94fcce7dd8c298958a53a8b0d0e52d91c0b26f8d1746ec72d5527594d678ec19c29f4849994d268fbdb6200a5c13c7699

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    6d6193e45980ad825c01611bfe988f41

    SHA1

    2bedd8025c1e85f24bc164d99159ca95a98c686b

    SHA256

    7952c3aacc0746733e5e7e616f8f022ff63fb061d6fd38a3ea40240ec77bf1a5

    SHA512

    bfbc6e50e41ea59eb1fc664585f382fba3d9444c23cd6c2f451a39084acf9b9b5372294d2d583eba320c4bc692d8caa5ed5558c87e98ad796faee49337a2e006

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    85e6eabfb02501e476f648949e2b5ac7

    SHA1

    67138a5f2b5746557d351d49dc5f7a3c118a8e34

    SHA256

    94a03f2cdb7cb5d78e35c291c091c4d457b07b4bd7c7030b43324e57e7abf28d

    SHA512

    3dd2db7680e520f3f4c86b2dbae2d72c1758845469df92e38d080e97e6187ae8d2463ebeafb1420e8762734f466a8ce6cdb70b7268c8e046d9cd29cac86c409b

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    135KB

    MD5

    e7c889be6322218401cfe5a0018ac416

    SHA1

    e34a6d8624f82a098975517f6ae3c17804253807

    SHA256

    f1b448be1ae719590f0a875f52fcce6ef46c0c6c678958ca63c09549ec14931b

    SHA512

    74cc70b9c19088ab893e1c1e3e5afca4d504ec04726452dc85233373cd6a788ecef8ce8d094eed9eb67c027f1b7ab1c37111682ee6f6339e23de0bdf2437db00

  • \??\c:\windows\resources\svchost.exe

    Filesize

    135KB

    MD5

    abe408ccda6b28920df6953f354892f5

    SHA1

    b2bfeb035745106538a945e30ee9cefd62e0715b

    SHA256

    a8f7373289034f92f50c54c9d84220595ecb4a3a160f42b0a6cf065b84d5ee86

    SHA512

    1051f3b92f53666449ce5dbd2af202afdc8bf4f15d137c11696307d6a7fc4d5e0e428762d09dec5546b07fc4869ea634ef3a72c9ec94f98ed071cf5adc4e5a58

  • memory/1880-33-0x00007FFE6D830000-0x00007FFE6E2F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1880-11-0x00007FFE6D830000-0x00007FFE6E2F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1880-10-0x0000000000DC0000-0x00000000010E4000-memory.dmp

    Filesize

    3.1MB

  • memory/1880-9-0x00007FFE6D833000-0x00007FFE6D835000-memory.dmp

    Filesize

    8KB

  • memory/1984-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2280-65-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2284-66-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2784-42-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2784-62-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2968-64-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2972-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2972-63-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3856-67-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB