Analysis
-
max time kernel
6s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 01:21
Behavioral task
behavioral1
Sample
robloxfischscriptlist.exe
Resource
win7-20240708-en
General
-
Target
robloxfischscriptlist.exe
-
Size
348KB
-
MD5
548fa12c57a2af723d85d90a4a8a6611
-
SHA1
b149e2c987cf1c584b94bb752bd81b27cde7f83b
-
SHA256
a591429743ce96a0c4b8d7e86130c3a61505cde949e9996b15117f6ab85a2b85
-
SHA512
3dc814d8ea98219444800ddffb6ff885fca45b8e305022156ea1620a09c5667a53d115225e4ef60448121797a4f383891cfd61b8bdc2bad61cc42828d0d7a217
-
SSDEEP
6144:MmNHXf500MbsOnxaxfROEUbDgosLDqvJq9v7IHPnW:Td50iOnvEViJq9TIvnW
Malware Config
Extracted
quasar
1.3.0.0
Clint
192.168.178.29:4780
QSR_MUTEX_02VEKG7zCDubNpN0wF
-
encryption_key
Bdex5bWk923mG5O2SXnn
-
install_name
robloxfisch.exe
-
log_directory
Log
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2100-1-0x0000000000BB0000-0x0000000000C0E000-memory.dmp family_quasar behavioral1/files/0x0008000000018741-4.dat family_quasar behavioral1/memory/536-10-0x0000000000C90000-0x0000000000CEE000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 536 robloxfisch.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 robloxfischscriptlist.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language robloxfischscriptlist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language robloxfisch.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe 2320 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2100 robloxfischscriptlist.exe Token: SeDebugPrivilege 536 robloxfisch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 536 robloxfisch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2320 2100 robloxfischscriptlist.exe 31 PID 2100 wrote to memory of 2320 2100 robloxfischscriptlist.exe 31 PID 2100 wrote to memory of 2320 2100 robloxfischscriptlist.exe 31 PID 2100 wrote to memory of 2320 2100 robloxfischscriptlist.exe 31 PID 2100 wrote to memory of 536 2100 robloxfischscriptlist.exe 33 PID 2100 wrote to memory of 536 2100 robloxfischscriptlist.exe 33 PID 2100 wrote to memory of 536 2100 robloxfischscriptlist.exe 33 PID 2100 wrote to memory of 536 2100 robloxfischscriptlist.exe 33 PID 536 wrote to memory of 2608 536 robloxfisch.exe 34 PID 536 wrote to memory of 2608 536 robloxfisch.exe 34 PID 536 wrote to memory of 2608 536 robloxfisch.exe 34 PID 536 wrote to memory of 2608 536 robloxfisch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\robloxfischscriptlist.exe"C:\Users\Admin\AppData\Local\Temp\robloxfischscriptlist.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\robloxfischscriptlist.exe" /rl HIGHEST /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2320
-
-
C:\Users\Admin\AppData\Roaming\SubDir\robloxfisch.exe"C:\Users\Admin\AppData\Roaming\SubDir\robloxfisch.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\robloxfisch.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5548fa12c57a2af723d85d90a4a8a6611
SHA1b149e2c987cf1c584b94bb752bd81b27cde7f83b
SHA256a591429743ce96a0c4b8d7e86130c3a61505cde949e9996b15117f6ab85a2b85
SHA5123dc814d8ea98219444800ddffb6ff885fca45b8e305022156ea1620a09c5667a53d115225e4ef60448121797a4f383891cfd61b8bdc2bad61cc42828d0d7a217