Analysis
-
max time kernel
298s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 15:47
General
-
Target
cracked ghost.exe
-
Size
3.1MB
-
MD5
8fb6e61c70265d45b480e1eca5b30e76
-
SHA1
0a21e12daefaeda97e884c115692e3ddaa3e0c8d
-
SHA256
d4a60c83d98c9d6c74eec924ec2e2162e52b1b891c86879e362f53e16c368c02
-
SHA512
c90dcbee2100579d3344e730e4c5d3237a9d160cd0d9ac852d50d3839ded2dc23957bd2ff9b902b0858a9f233e5169745de03d409c6afaeee6b5099ac096f77c
-
SSDEEP
49152:evyI22SsaNYfdPBldt698dBcjHxACw9BxISoGd7sTHHB72eh2NT:evf22SsaNYfdPBldt6+dBcjH/wzL
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.54:4782
1f2a5187-d470-4222-a3bc-7922d33f971c
-
encryption_key
5D09CC3094EDBAD95E2D5D556E759224738027A3
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3420-1-0x00000000008C0000-0x0000000000BE4000-memory.dmp family_quasar behavioral1/files/0x0007000000023caf-6.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3144 Client.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3672 schtasks.exe 3488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3420 cracked ghost.exe Token: SeDebugPrivilege 3144 Client.exe Token: SeDebugPrivilege 3996 taskmgr.exe Token: SeSystemProfilePrivilege 3996 taskmgr.exe Token: SeCreateGlobalPrivilege 3996 taskmgr.exe Token: 33 3996 taskmgr.exe Token: SeIncBasePriorityPrivilege 3996 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe 3996 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3144 Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3420 wrote to memory of 3672 3420 cracked ghost.exe 84 PID 3420 wrote to memory of 3672 3420 cracked ghost.exe 84 PID 3420 wrote to memory of 3144 3420 cracked ghost.exe 86 PID 3420 wrote to memory of 3144 3420 cracked ghost.exe 86 PID 3144 wrote to memory of 3488 3144 Client.exe 87 PID 3144 wrote to memory of 3488 3144 Client.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cracked ghost.exe"C:\Users\Admin\AppData\Local\Temp\cracked ghost.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3672
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3488
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58fb6e61c70265d45b480e1eca5b30e76
SHA10a21e12daefaeda97e884c115692e3ddaa3e0c8d
SHA256d4a60c83d98c9d6c74eec924ec2e2162e52b1b891c86879e362f53e16c368c02
SHA512c90dcbee2100579d3344e730e4c5d3237a9d160cd0d9ac852d50d3839ded2dc23957bd2ff9b902b0858a9f233e5169745de03d409c6afaeee6b5099ac096f77c