Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2025, 02:20 UTC

General

  • Target

    33aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e.exe

  • Size

    3.2MB

  • MD5

    64037f2d91fe82b3cf5300d6fa6d21c3

  • SHA1

    61c8649b92fc06db644616af549ff5513f0f0a6d

  • SHA256

    33aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e

  • SHA512

    2a70ef0c4d3a2237175078f0e84cd35d7d595422c3aa5219d6f0fe876f82cf60e1d4f592a58f166cf8175c52d275c21950c5ea421416fee8877dfaec5b9be008

  • SSDEEP

    49152:Kvkt62XlaSFNWPjljiFa2RoUYISyMDJERHWk/OgRoGduATHHB72eh2NT8:Kv462XlaSFNWPjljiFXRoUYILMDZq+q

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Helper Atanka

C2

193.203.238.136:8080

Mutex

14f39659-ca5b-4af7-8045-bed3500c385f

Attributes
  • encryption_key

    11049F2AEBDCF8E3A57474CD5FBA40FB2FFC5424

  • install_name

    diskutil.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    diskutil

  • subdirectory

    diskutil

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e.exe
    "C:\Users\Admin\AppData\Local\Temp\33aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "diskutil" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1936
    • C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe
      "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "diskutil" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3080

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    22.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    ipwho.is
    diskutil.exe
    Remote address:
    8.8.8.8:53
    Request
    ipwho.is
    IN A
    Response
    ipwho.is
    IN A
    195.201.57.90
  • flag-de
    GET
    https://ipwho.is/
    diskutil.exe
    Remote address:
    195.201.57.90:443
    Request
    GET / HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0
    Host: ipwho.is
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Wed, 01 Jan 2025 02:21:03 GMT
    Content-Type: application/json; charset=utf-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    Server: ipwhois
    Access-Control-Allow-Headers: *
    X-Robots-Tag: noindex
  • flag-us
    DNS
    136.238.203.193.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.238.203.193.in-addr.arpa
    IN PTR
    Response
    136.238.203.193.in-addr.arpa
    IN PTR
    orange-cheetah-19004zapcloud
  • flag-us
    DNS
    90.57.201.195.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    90.57.201.195.in-addr.arpa
    IN PTR
    Response
    90.57.201.195.in-addr.arpa
    IN PTR
    static9057201195clients your-serverde
  • flag-us
    DNS
    154.239.44.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    154.239.44.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    88.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    88.210.23.2.in-addr.arpa
    IN PTR
    Response
    88.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-88deploystaticakamaitechnologiescom
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 193.203.238.136:8080
    tls
    diskutil.exe
    2.0kB
    2.9kB
    20
    18
  • 195.201.57.90:443
    https://ipwho.is/
    tls, http
    diskutil.exe
    923 B
    6.3kB
    10
    10

    HTTP Request

    GET https://ipwho.is/

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    22.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    ipwho.is
    dns
    diskutil.exe
    54 B
    70 B
    1
    1

    DNS Request

    ipwho.is

    DNS Response

    195.201.57.90

  • 8.8.8.8:53
    136.238.203.193.in-addr.arpa
    dns
    74 B
    118 B
    1
    1

    DNS Request

    136.238.203.193.in-addr.arpa

  • 8.8.8.8:53
    90.57.201.195.in-addr.arpa
    dns
    72 B
    129 B
    1
    1

    DNS Request

    90.57.201.195.in-addr.arpa

  • 8.8.8.8:53
    154.239.44.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    154.239.44.20.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    22.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    22.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    88.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    88.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    43.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    43.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe

    Filesize

    3.2MB

    MD5

    64037f2d91fe82b3cf5300d6fa6d21c3

    SHA1

    61c8649b92fc06db644616af549ff5513f0f0a6d

    SHA256

    33aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e

    SHA512

    2a70ef0c4d3a2237175078f0e84cd35d7d595422c3aa5219d6f0fe876f82cf60e1d4f592a58f166cf8175c52d275c21950c5ea421416fee8877dfaec5b9be008

  • memory/2444-10-0x00007FFC50C40000-0x00007FFC51701000-memory.dmp

    Filesize

    10.8MB

  • memory/2444-11-0x00007FFC50C40000-0x00007FFC51701000-memory.dmp

    Filesize

    10.8MB

  • memory/2444-12-0x000000001C430000-0x000000001C480000-memory.dmp

    Filesize

    320KB

  • memory/2444-13-0x000000001C540000-0x000000001C5F2000-memory.dmp

    Filesize

    712KB

  • memory/2444-16-0x000000001C4B0000-0x000000001C4C2000-memory.dmp

    Filesize

    72KB

  • memory/2444-17-0x000000001CC40000-0x000000001CC7C000-memory.dmp

    Filesize

    240KB

  • memory/2444-18-0x00007FFC50C40000-0x00007FFC51701000-memory.dmp

    Filesize

    10.8MB

  • memory/5036-0-0x00007FFC50C43000-0x00007FFC50C45000-memory.dmp

    Filesize

    8KB

  • memory/5036-1-0x00000000001E0000-0x0000000000512000-memory.dmp

    Filesize

    3.2MB

  • memory/5036-2-0x00007FFC50C40000-0x00007FFC51701000-memory.dmp

    Filesize

    10.8MB

  • memory/5036-9-0x00007FFC50C40000-0x00007FFC51701000-memory.dmp

    Filesize

    10.8MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.