Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 16:40
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241023-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
06550a7d85870e79df0d9a55fb3bac98
-
SHA1
ed011b024814c737519d026bec4138ef8569d779
-
SHA256
60c5af78dbbde0379ee14544cd4f98cead5f516842fcbb94b3b1e035b82c0ac4
-
SHA512
51e48bf7e4f3a5b9f7b6806153423f9c484cc1405260a283539efad7c21cd50327b9670fb9f06cd25239d50e3fa7d168ec831a856d8b52d9ace2f63425bfb163
-
SSDEEP
49152:Tvae821/aQWl8P0lSk3aKA3Z+nMwRJ6ObR3LoGdhUKSTHHB72eh2NT:Tvx821/aQWl8P0lSk3DA3Z+nMwRJ6I
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.145:4782
192.168.56.1:4784
192.168.1.145:4784
192.168.1.254:4784
9d952f82-b8b7-4948-b2b7-53c225a63ebb
-
encryption_key
AAB9DCB0841C8C889A6BCA76764D0770416B2FE1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1676-1-0x0000000001000000-0x0000000001324000-memory.dmp family_quasar behavioral1/files/0x0008000000016de8-6.dat family_quasar behavioral1/memory/1496-9-0x00000000010C0000-0x00000000013E4000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 1496 Client.exe 1904 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2016 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2016 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2020 schtasks.exe 2404 schtasks.exe 2928 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1676 Client-built.exe Token: SeDebugPrivilege 1496 Client.exe Token: SeDebugPrivilege 1904 Client.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1496 Client.exe 1904 Client.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2404 1676 Client-built.exe 30 PID 1676 wrote to memory of 2404 1676 Client-built.exe 30 PID 1676 wrote to memory of 2404 1676 Client-built.exe 30 PID 1676 wrote to memory of 1496 1676 Client-built.exe 32 PID 1676 wrote to memory of 1496 1676 Client-built.exe 32 PID 1676 wrote to memory of 1496 1676 Client-built.exe 32 PID 1496 wrote to memory of 2928 1496 Client.exe 33 PID 1496 wrote to memory of 2928 1496 Client.exe 33 PID 1496 wrote to memory of 2928 1496 Client.exe 33 PID 1496 wrote to memory of 1968 1496 Client.exe 36 PID 1496 wrote to memory of 1968 1496 Client.exe 36 PID 1496 wrote to memory of 1968 1496 Client.exe 36 PID 1968 wrote to memory of 588 1968 cmd.exe 38 PID 1968 wrote to memory of 588 1968 cmd.exe 38 PID 1968 wrote to memory of 588 1968 cmd.exe 38 PID 1968 wrote to memory of 2016 1968 cmd.exe 39 PID 1968 wrote to memory of 2016 1968 cmd.exe 39 PID 1968 wrote to memory of 2016 1968 cmd.exe 39 PID 1968 wrote to memory of 1904 1968 cmd.exe 40 PID 1968 wrote to memory of 1904 1968 cmd.exe 40 PID 1968 wrote to memory of 1904 1968 cmd.exe 40 PID 1904 wrote to memory of 2020 1904 Client.exe 41 PID 1904 wrote to memory of 2020 1904 Client.exe 41 PID 1904 wrote to memory of 2020 1904 Client.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2404
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2928
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\M6su03uv7v8q.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2016
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2020
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD555afb9e9272d8fba7a0e79d4f1ef1791
SHA1d610c6562317b42ab13f34e1a80176bfa4f280f0
SHA25634419e60c16be8b8aeaf62ce8a516da8a2225aced12ecc231f0dc476485869d9
SHA5122e6e75ab0ea1ff8cc8d7a5d1ed5d018550c2b85a41cb40186eab962f7db8f9b1c8382a837c2f61c496873a43b528b1e6c841aa1b551ef66baac17c91566e04b9
-
Filesize
3.1MB
MD506550a7d85870e79df0d9a55fb3bac98
SHA1ed011b024814c737519d026bec4138ef8569d779
SHA25660c5af78dbbde0379ee14544cd4f98cead5f516842fcbb94b3b1e035b82c0ac4
SHA51251e48bf7e4f3a5b9f7b6806153423f9c484cc1405260a283539efad7c21cd50327b9670fb9f06cd25239d50e3fa7d168ec831a856d8b52d9ace2f63425bfb163