Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 02:34
Behavioral task
behavioral1
Sample
59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe
Resource
win7-20241023-en
General
-
Target
59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe
-
Size
3.1MB
-
MD5
44037f6c2fed815da4c59b50479561f5
-
SHA1
f724de9954505061cd9f4fbe90bd57d8375ef6d1
-
SHA256
59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553
-
SHA512
e33bb327a8b8afc38bba20adfe4d00d99bd3772d65df1125796e5de00d02e37e8ea3a9ce48d16d5374343079d7addf8456c09b053ef9dfec35d183aaddfdf30d
-
SSDEEP
49152:twAlUPhZwv68DkG17WlqTz5oqMn0f8bUlUUU+UUUZAMoAGdQTHHB72eh2NT:twsUPhZwv68DkG17WlqTzeqMn0fcK
Malware Config
Extracted
quasar
1.4.2
Java
45.83.244.141:4782
18dba2e6-0f3a-4d9f-b95d-78cbc696f514
-
encryption_key
88D5D2E6C33089786488A381589CC2587B1B6759
-
install_name
$77-cmd.exe
-
log_directory
$77-Logs
-
reconnect_delay
1000
-
startup_key
$77-cmd
-
subdirectory
$77-SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2988-1-0x0000000000870000-0x0000000000B94000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2988 59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe"C:\Users\Admin\AppData\Local\Temp\59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2988