Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 05:01

General

  • Target

    5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe

  • Size

    3.2MB

  • MD5

    189a348006367f0532cafbced6f4f7a0

  • SHA1

    334fe5ea524c5a8e51ba8cb0ade6d894c9c8f94c

  • SHA256

    5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641

  • SHA512

    679706cf963b7ed251e61dc8d26b2fea1016ec72cf2596a4852c85d1ad5d4b8e43bd2d761f192e72cc5e5e39ecb6ce666366bdf2a0927f93186317ddc3bdca80

  • SSDEEP

    49152:tivht62XlaSFNWPjljiFa2RoUYI4CZ1J5LoGdQPTHHB72eh2NTi:MvL62XlaSFNWPjljiFXRoUYI4CT4

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

4.tcp.us-cal-1.ngrok.io:18092

Mutex

11bbf22e-826e-486b-b024-adbd86228a9e

Attributes
  • encryption_key

    7A589EDBC6A581E125BF830EF0D05FC74BB75E30

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    ctfmon

  • subdirectory

    SubDir

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe
    "C:\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3336
    • \??\c:\users\admin\appdata\local\temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 
      c:\users\admin\appdata\local\temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3796
      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4044
        • \??\c:\users\admin\appdata\roaming\subdir\client.exe 
          c:\users\admin\appdata\roaming\subdir\client.exe 
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3460
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4204
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3936
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3640
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3164
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 

    Filesize

    3.1MB

    MD5

    942d7d99678d584c4481278378741d51

    SHA1

    97efb624cfa34da0c5583e61a5982fd496de8e2d

    SHA256

    4119dedd1d6408f80505394a374cde76124a736913f958c878f54c16c98986e3

    SHA512

    0c1798628d5c90eaa6cf54277ab917408b5921e4f39ece0505510d9b7241df6748a365bc2a0a1cdaa24771f4ac56a9973a6515a0e32a14a66a9ed98c2871dfba

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

    Filesize

    3.2MB

    MD5

    189a348006367f0532cafbced6f4f7a0

    SHA1

    334fe5ea524c5a8e51ba8cb0ade6d894c9c8f94c

    SHA256

    5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641

    SHA512

    679706cf963b7ed251e61dc8d26b2fea1016ec72cf2596a4852c85d1ad5d4b8e43bd2d761f192e72cc5e5e39ecb6ce666366bdf2a0927f93186317ddc3bdca80

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    dbe782956ab1c064eeef8e54f9c70b1b

    SHA1

    84fe88563cb3232d80acfad0bbddea54bcd04b48

    SHA256

    2902f2d11ee19a272f40812060305e283c48bd6d0a1dcd24ba998f233de61122

    SHA512

    be1d5afd5e9eaad851604bb2aa02cc31b046d848d981dc7b1220858113008755268c98636363b5d4a11d2a512fdbde003e17b6e091065484d4d677f883cf2783

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    75103a2b5a70d0c7b2dac8af8ec0f936

    SHA1

    1a4f760cac0f1ab3be43a161d8f01e17c7233e54

    SHA256

    2ccbbe3621e201a7ad027003271adced99a6349ad0aac5cad8027319ced8e59e

    SHA512

    8a39542db0f5c031d69d2999f1b2d235dc468a38682b161e5e9fce3fbbd3ce50b5c63a182a3656c30d3ffaa6678658663355234ef8d6b58bd9c0d3f1c7f4418e

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    15b66f639454c4e77882e68e7ff5b090

    SHA1

    e82d62d9cf056a7d5e7ab029804ffd832e8822c9

    SHA256

    cd5be1dcfc1f5db05987dcfaf68e56d658d40e74df25f9064adae6d1c7ea4417

    SHA512

    06c711333b6a7ac45ac29c84dafb521eab162ede14cce4d2fbe61318c20dd973e07b6d20a88b2fbf2b83a794b4ae8dae1c4d80c153c2920a7886f59b8576b9b7

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    135KB

    MD5

    04cb522ad0fb514f77fd6dc268f6119d

    SHA1

    3bba34786168efe9ec74577def2cbaa4935d05e3

    SHA256

    548047be3c6e147ace0e9ff979e3404e2b8537347171d44a2f725a975660b4cc

    SHA512

    07f638569e01c7c13ef876975f14ece4bbcf7ee28ed7cc5d780287d9a420c2d5a47525d026761b58566b19867e7faf26e9fb83096cb29c7b6b5b0b77f86c7cbd

  • memory/3164-67-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3336-64-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3336-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3640-62-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3716-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3936-30-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3936-66-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4044-65-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4204-63-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5080-29-0x00007FFC50C40000-0x00007FFC51701000-memory.dmp

    Filesize

    10.8MB

  • memory/5080-11-0x00007FFC50C40000-0x00007FFC51701000-memory.dmp

    Filesize

    10.8MB

  • memory/5080-10-0x0000000000680000-0x00000000009A4000-memory.dmp

    Filesize

    3.1MB

  • memory/5080-9-0x00007FFC50C43000-0x00007FFC50C45000-memory.dmp

    Filesize

    8KB