Analysis
-
max time kernel
19s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 01:21
Behavioral task
behavioral1
Sample
robloxfischscriptlist.exe
Resource
win7-20240708-en
General
-
Target
robloxfischscriptlist.exe
-
Size
348KB
-
MD5
548fa12c57a2af723d85d90a4a8a6611
-
SHA1
b149e2c987cf1c584b94bb752bd81b27cde7f83b
-
SHA256
a591429743ce96a0c4b8d7e86130c3a61505cde949e9996b15117f6ab85a2b85
-
SHA512
3dc814d8ea98219444800ddffb6ff885fca45b8e305022156ea1620a09c5667a53d115225e4ef60448121797a4f383891cfd61b8bdc2bad61cc42828d0d7a217
-
SSDEEP
6144:MmNHXf500MbsOnxaxfROEUbDgosLDqvJq9v7IHPnW:Td50iOnvEViJq9TIvnW
Malware Config
Extracted
quasar
1.3.0.0
Clint
192.168.178.29:4780
QSR_MUTEX_02VEKG7zCDubNpN0wF
-
encryption_key
Bdex5bWk923mG5O2SXnn
-
install_name
robloxfisch.exe
-
log_directory
Log
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/2716-1-0x00000000000F0000-0x000000000014E000-memory.dmp family_quasar behavioral2/files/0x000a000000023b64-10.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2204 robloxfisch.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language robloxfischscriptlist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language robloxfisch.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe 2272 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2716 robloxfischscriptlist.exe Token: SeDebugPrivilege 2204 robloxfisch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 robloxfisch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2108 2716 robloxfischscriptlist.exe 84 PID 2716 wrote to memory of 2108 2716 robloxfischscriptlist.exe 84 PID 2716 wrote to memory of 2108 2716 robloxfischscriptlist.exe 84 PID 2716 wrote to memory of 2204 2716 robloxfischscriptlist.exe 86 PID 2716 wrote to memory of 2204 2716 robloxfischscriptlist.exe 86 PID 2716 wrote to memory of 2204 2716 robloxfischscriptlist.exe 86 PID 2204 wrote to memory of 2272 2204 robloxfisch.exe 87 PID 2204 wrote to memory of 2272 2204 robloxfisch.exe 87 PID 2204 wrote to memory of 2272 2204 robloxfisch.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\robloxfischscriptlist.exe"C:\Users\Admin\AppData\Local\Temp\robloxfischscriptlist.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\robloxfischscriptlist.exe" /rl HIGHEST /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\SubDir\robloxfisch.exe"C:\Users\Admin\AppData\Roaming\SubDir\robloxfisch.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\robloxfisch.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD5548fa12c57a2af723d85d90a4a8a6611
SHA1b149e2c987cf1c584b94bb752bd81b27cde7f83b
SHA256a591429743ce96a0c4b8d7e86130c3a61505cde949e9996b15117f6ab85a2b85
SHA5123dc814d8ea98219444800ddffb6ff885fca45b8e305022156ea1620a09c5667a53d115225e4ef60448121797a4f383891cfd61b8bdc2bad61cc42828d0d7a217