Analysis
-
max time kernel
128s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 00:31
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
2c55c3ba3aa93887c266436bcaaae5c4
-
SHA1
0e20e8a15bbf5efd0bf927e49ffc8237e691951c
-
SHA256
e815640357032206eb40f35f30804f4bb0cb14addf9858cdc36297b583b3cbfa
-
SHA512
ffe786d730e8de697a41ac89e449de7717d2aee09e4ef5653268d8d584d798a89c132ca5f32051c07a99378cf0ff6b45a8fc2ab99c53bab0fc3b4a74cd4b5968
-
SSDEEP
49152:6vbI22SsaNYfdPBldt698dBcjHgk/LWmzAwoGdu8THHB72eh2NT:6vk22SsaNYfdPBldt6+dBcjHp/Lx+
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
192.168.100.244:443
Mutex
e4b3274f-fb75-4407-9316-141c32c7c7ca
Attributes
-
encryption_key
53FC47CB30FD7835477E4751610AF9D6FC6D5AFB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2448-1-0x0000000000AE0000-0x0000000000E04000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2448 Client-built.exe