Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2025, 15:02 UTC

General

  • Target

    Cleaner.exe

  • Size

    3.1MB

  • MD5

    f1f656fdd0c4224b3900a4c2d50443e6

  • SHA1

    9b2879d91a63e6437ec7b47a5c39dd5cc64c9df3

  • SHA256

    e278b36305e60e18a29c4b388248a78bd9c58fabc17fa9943392c43e7a49588e

  • SHA512

    2b8ea438b308c94d463f06c8a04da1fa292f448b6f024e59423a1df5f5693b4957d12ffef6d03679f2d4a0c93d93ba16d8acf5c74f694f3a1a5b91aae1d378cf

  • SSDEEP

    49152:GvyI22SsaNYfdPBldt698dBcjHlCy1JzLoGdZTHHB72eh2NT:Gvf22SsaNYfdPBldt6+dBcjHlCm

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.145:4782

Mutex

9d952f82-b8b7-4948-b2b7-53c225a63ebb

Attributes
  • encryption_key

    AAB9DCB0841C8C889A6BCA76764D0770416B2FE1

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\Cleaner.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\system32\schtasks.exe
      "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2660
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Windows\system32\schtasks.exe
        "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1268

Network

    No results found
  • 192.168.1.145:4782
    Client.exe
    152 B
    3
  • 192.168.1.145:4782
    Client.exe
    152 B
    3
  • 192.168.1.145:4782
    Client.exe
    152 B
    3
  • 192.168.1.145:4782
    Client.exe
    152 B
    3
  • 192.168.1.145:4782
    Client.exe
    152 B
    3
  • 192.168.1.145:4782
    Client.exe
    152 B
    3
  • 192.168.1.145:4782
    Client.exe
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

    Filesize

    3.1MB

    MD5

    f1f656fdd0c4224b3900a4c2d50443e6

    SHA1

    9b2879d91a63e6437ec7b47a5c39dd5cc64c9df3

    SHA256

    e278b36305e60e18a29c4b388248a78bd9c58fabc17fa9943392c43e7a49588e

    SHA512

    2b8ea438b308c94d463f06c8a04da1fa292f448b6f024e59423a1df5f5693b4957d12ffef6d03679f2d4a0c93d93ba16d8acf5c74f694f3a1a5b91aae1d378cf

  • memory/1272-0-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

    Filesize

    4KB

  • memory/1272-1-0x0000000000B80000-0x0000000000EA4000-memory.dmp

    Filesize

    3.1MB

  • memory/1272-2-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

  • memory/1272-8-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2344-10-0x0000000000150000-0x0000000000474000-memory.dmp

    Filesize

    3.1MB

  • memory/2344-9-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2344-11-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2344-12-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.