Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 04:56

General

  • Target

    6d6c9c719e2f757442374af378c343a7.exe

  • Size

    3.1MB

  • MD5

    6d6c9c719e2f757442374af378c343a7

  • SHA1

    a58a2aa6dae2dbdf64472614985cac2adce4eddb

  • SHA256

    444c97f6db0626069965d9e4ddb4bf315326954c51b123b3dc7d64084e7fb646

  • SHA512

    a3ef795e64b1d43ca300da97abc7d211e5987064c1c7cafa7a1dadcd1cb35902fb230f5b8e9a008ced4bc1d33573403bad2d99a4ccca9b6b749355110eb10210

  • SSDEEP

    49152:HwElUPhZwv68DkG17WlqTz5oqM/p7vGJfAHdkTHHB72eh2NT:HwYUPhZwv68DkG17WlqTzeqM/p6t

Malware Config

Extracted

Family

quasar

Version

1.4.2

Botnet

Office04

C2

193.31.28.181:4004

Mutex

704ccf6d-01bf-4037-a807-12a60509b1a4

Attributes
  • encryption_key

    379B83B5AFE5908E0BC4583EBB5A83D7B76D2E00

  • install_name

    Client.exe

  • log_directory

    $77-Logs

  • reconnect_delay

    3000

  • startup_key

    $77-cmd

  • subdirectory

    $77-cmd

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 3 IoCs
  • Modifies registry class 13 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d6c9c719e2f757442374af378c343a7.exe
    "C:\Users\Admin\AppData\Local\Temp\6d6c9c719e2f757442374af378c343a7.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "$77-cmd" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\$77-cmd\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2384
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\$77-cmd\UACBypass1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Windows\system32\reg.exe
        reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\Admin\AppData\Roaming\$77-cmd\Client.exe" /f
        3⤵
        • Modifies registry class
        PID:2832
      • C:\Windows\system32\reg.exe
        reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
        3⤵
        • Modifies registry class
        PID:2836
      • C:\Windows\system32\timeout.exe
        timeout /t 2 /nobreak
        3⤵
        • Delays execution with timeout.exe
        PID:2848
      • C:\Windows\system32\reg.exe
        reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
        3⤵
        • Modifies registry class
        PID:2744
      • C:\Windows\system32\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Roaming\$77-cmd\UACBypass1.bat"
        3⤵
          PID:2752
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Roaming\$77-cmd\UACBypass2.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\system32\reg.exe
          reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
          3⤵
            PID:2624
          • C:\Windows\system32\reg.exe
            reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /ve /d "C:\Users\Admin\AppData\Roaming\$77-cmd\Install.exe" /f
            3⤵
            • Modifies registry class
            PID:2684
          • C:\Windows\system32\reg.exe
            reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v "DelegateExecute" /f
            3⤵
            • Modifies registry class
            PID:2692
          • C:\Windows\system32\timeout.exe
            timeout /t 2 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:1872
          • C:\Windows\system32\reg.exe
            reg delete "HKCU\Software\Classes\ms-settings\shell\open\command" /f
            3⤵
            • Modifies registry class
            PID:2316
          • C:\Windows\system32\cmd.exe
            cmd /c del "C:\Users\Admin\AppData\Roaming\$77-cmd\UACBypass2.bat"
            3⤵
              PID:2152
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Roaming\$77-cmd\Melt.bat" "
            2⤵
            • Deletes itself
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Windows\system32\timeout.exe
              timeout /t 5 /nobreak
              3⤵
              • Delays execution with timeout.exe
              PID:2664

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\$77-cmd\Melt.bat

          Filesize

          118B

          MD5

          de5e036a2f08f6ca6f6c501e906ee183

          SHA1

          a3c38b7d2ea31066d0bae492fb56649c22a73153

          SHA256

          d6c0337116e52ef3fb46fcab1ade26cf9538e47f892c362f5317de3dd98d27ae

          SHA512

          80ae4c5985b78fc2a74ab8946125f6a04ae8ca9102ad313fe543772a7aace610af1a8c17efaaadcbdad29cb1fa3170de632a984ec183e24fa7cdfeb81664c384

        • C:\Users\Admin\AppData\Roaming\$77-cmd\UACBypass1.bat

          Filesize

          368B

          MD5

          2c3953fd265ea1d97e348ff0a6daa80a

          SHA1

          f794d9fc87e3011b1b134b45a20a5a3b7762497c

          SHA256

          5b580991ef331e03c600f18fcdcae08763ee887c4ffa4d714244fa19dc762082

          SHA512

          7b442c0934db9aca25cbc2d5b6d84f762905837f60120bc083b83d4858e6c24dec5633db5dff89825435f67f2fde9c1de5bf05ec21c6e6851c3e2ec0e853dad0

        • C:\Users\Admin\AppData\Roaming\$77-cmd\UACBypass2.bat

          Filesize

          401B

          MD5

          8702552763fe86626d3cb6c766578cc8

          SHA1

          53f2b99da6b2e1edc557fd999801b8e768699da0

          SHA256

          e199e4c1f8ce95a86356655c6863bbdc0c4266bee73c872e97398419672ed626

          SHA512

          355063c41d254ad0675c36f535b84d4bf1c6d716dc785bcdd668edb53d76454d3b372bacfe0c382a38be2b813eb463545deed47bf724c3d6d4fd52aa129b79e3

        • memory/2528-0-0x000007FEF5DA3000-0x000007FEF5DA4000-memory.dmp

          Filesize

          4KB

        • memory/2528-1-0x0000000000260000-0x0000000000584000-memory.dmp

          Filesize

          3.1MB

        • memory/2528-2-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

          Filesize

          9.9MB

        • memory/2528-31-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

          Filesize

          9.9MB