Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 19:08
Behavioral task
behavioral1
Sample
xenonew.exe
Resource
win7-20240903-en
General
-
Target
xenonew.exe
-
Size
3.1MB
-
MD5
2d60a76ce3357eecb47f10d21ba01fb0
-
SHA1
1798a8dee078e7bd72296e79bbd2c2061d584fd7
-
SHA256
55fd96a344bf6ccbf74dc7408f77f1080158fc2a0a20903b20e77a9cee2983d1
-
SHA512
184f946295c7669f46a8fb878cb68bea943ed09c74cbd3588d4d7572295668edc8ba098f4e8c2deb21977d08ecc4b1f8e34376c4bb3074073e889864f04852e8
-
SSDEEP
49152:fvelL26AaNeWgPhlmVqvMQ7XSK1NRJ6XbR3LoGduTHHB72eh2NT:fvOL26AaNeWgPhlmVqkQ7XSK1NRJ6p
Malware Config
Extracted
quasar
1.4.1
Office04
augustinevegas-31173.portmap.host:31173
7d74883a-5879-4f61-8c23-fc7af453d7c2
-
encryption_key
0B6DCD2BE4C82058601AFDA4AB9525FABE85A71D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/1816-1-0x0000000000A80000-0x0000000000DA4000-memory.dmp family_quasar behavioral2/files/0x000a000000023b9d-5.dat family_quasar -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 15 IoCs
pid Process 4392 Client.exe 3296 Client.exe 3192 Client.exe 2684 Client.exe 3028 Client.exe 548 Client.exe 1968 Client.exe 3600 Client.exe 2876 Client.exe 3492 Client.exe 3756 Client.exe 4812 Client.exe 1172 Client.exe 4696 Client.exe 116 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1840 PING.EXE 1516 PING.EXE 4892 PING.EXE 1104 PING.EXE 2208 PING.EXE 876 PING.EXE 1284 PING.EXE 4420 PING.EXE 808 PING.EXE 3232 PING.EXE 4872 PING.EXE 1960 PING.EXE 3720 PING.EXE 4344 PING.EXE 1540 PING.EXE -
Runs ping.exe 1 TTPs 15 IoCs
pid Process 3232 PING.EXE 1960 PING.EXE 3720 PING.EXE 876 PING.EXE 2208 PING.EXE 4344 PING.EXE 1540 PING.EXE 808 PING.EXE 4872 PING.EXE 1516 PING.EXE 4420 PING.EXE 4892 PING.EXE 1104 PING.EXE 1284 PING.EXE 1840 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe 868 schtasks.exe 4908 schtasks.exe 1244 schtasks.exe 3864 schtasks.exe 1340 schtasks.exe 5064 schtasks.exe 1436 schtasks.exe 4732 schtasks.exe 5052 schtasks.exe 1320 schtasks.exe 1340 schtasks.exe 2452 schtasks.exe 4996 schtasks.exe 4236 schtasks.exe 1056 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1816 xenonew.exe Token: SeDebugPrivilege 4392 Client.exe Token: SeDebugPrivilege 3296 Client.exe Token: SeDebugPrivilege 3192 Client.exe Token: SeDebugPrivilege 2684 Client.exe Token: SeDebugPrivilege 3028 Client.exe Token: SeDebugPrivilege 548 Client.exe Token: SeDebugPrivilege 1968 Client.exe Token: SeDebugPrivilege 3600 Client.exe Token: SeDebugPrivilege 2876 Client.exe Token: SeDebugPrivilege 3492 Client.exe Token: SeDebugPrivilege 3756 Client.exe Token: SeDebugPrivilege 4812 Client.exe Token: SeDebugPrivilege 1172 Client.exe Token: SeDebugPrivilege 4696 Client.exe Token: SeDebugPrivilege 116 Client.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 4392 Client.exe 3296 Client.exe 3192 Client.exe 2684 Client.exe 3028 Client.exe 548 Client.exe 1968 Client.exe 3600 Client.exe 2876 Client.exe 3492 Client.exe 3756 Client.exe 4812 Client.exe 1172 Client.exe 4696 Client.exe 116 Client.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 4392 Client.exe 3296 Client.exe 3192 Client.exe 2684 Client.exe 3028 Client.exe 548 Client.exe 1968 Client.exe 3600 Client.exe 2876 Client.exe 3492 Client.exe 3756 Client.exe 4812 Client.exe 1172 Client.exe 4696 Client.exe 116 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4392 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1816 wrote to memory of 4236 1816 xenonew.exe 82 PID 1816 wrote to memory of 4236 1816 xenonew.exe 82 PID 1816 wrote to memory of 4392 1816 xenonew.exe 84 PID 1816 wrote to memory of 4392 1816 xenonew.exe 84 PID 4392 wrote to memory of 1056 4392 Client.exe 85 PID 4392 wrote to memory of 1056 4392 Client.exe 85 PID 4392 wrote to memory of 1740 4392 Client.exe 87 PID 4392 wrote to memory of 1740 4392 Client.exe 87 PID 1740 wrote to memory of 1284 1740 cmd.exe 89 PID 1740 wrote to memory of 1284 1740 cmd.exe 89 PID 1740 wrote to memory of 2208 1740 cmd.exe 90 PID 1740 wrote to memory of 2208 1740 cmd.exe 90 PID 1740 wrote to memory of 3296 1740 cmd.exe 96 PID 1740 wrote to memory of 3296 1740 cmd.exe 96 PID 3296 wrote to memory of 5052 3296 Client.exe 97 PID 3296 wrote to memory of 5052 3296 Client.exe 97 PID 3296 wrote to memory of 3824 3296 Client.exe 100 PID 3296 wrote to memory of 3824 3296 Client.exe 100 PID 3824 wrote to memory of 4088 3824 cmd.exe 103 PID 3824 wrote to memory of 4088 3824 cmd.exe 103 PID 3824 wrote to memory of 4344 3824 cmd.exe 104 PID 3824 wrote to memory of 4344 3824 cmd.exe 104 PID 3824 wrote to memory of 3192 3824 cmd.exe 105 PID 3824 wrote to memory of 3192 3824 cmd.exe 105 PID 3192 wrote to memory of 1320 3192 Client.exe 106 PID 3192 wrote to memory of 1320 3192 Client.exe 106 PID 3192 wrote to memory of 2172 3192 Client.exe 108 PID 3192 wrote to memory of 2172 3192 Client.exe 108 PID 2172 wrote to memory of 3948 2172 cmd.exe 110 PID 2172 wrote to memory of 3948 2172 cmd.exe 110 PID 2172 wrote to memory of 1540 2172 cmd.exe 111 PID 2172 wrote to memory of 1540 2172 cmd.exe 111 PID 2172 wrote to memory of 2684 2172 cmd.exe 114 PID 2172 wrote to memory of 2684 2172 cmd.exe 114 PID 2684 wrote to memory of 1340 2684 Client.exe 115 PID 2684 wrote to memory of 1340 2684 Client.exe 115 PID 2684 wrote to memory of 3196 2684 Client.exe 117 PID 2684 wrote to memory of 3196 2684 Client.exe 117 PID 3196 wrote to memory of 1972 3196 cmd.exe 119 PID 3196 wrote to memory of 1972 3196 cmd.exe 119 PID 3196 wrote to memory of 4420 3196 cmd.exe 120 PID 3196 wrote to memory of 4420 3196 cmd.exe 120 PID 3196 wrote to memory of 3028 3196 cmd.exe 121 PID 3196 wrote to memory of 3028 3196 cmd.exe 121 PID 3028 wrote to memory of 1436 3028 Client.exe 122 PID 3028 wrote to memory of 1436 3028 Client.exe 122 PID 3028 wrote to memory of 2528 3028 Client.exe 124 PID 3028 wrote to memory of 2528 3028 Client.exe 124 PID 2528 wrote to memory of 3328 2528 cmd.exe 126 PID 2528 wrote to memory of 3328 2528 cmd.exe 126 PID 2528 wrote to memory of 808 2528 cmd.exe 127 PID 2528 wrote to memory of 808 2528 cmd.exe 127 PID 2528 wrote to memory of 548 2528 cmd.exe 128 PID 2528 wrote to memory of 548 2528 cmd.exe 128 PID 548 wrote to memory of 1244 548 Client.exe 129 PID 548 wrote to memory of 1244 548 Client.exe 129 PID 548 wrote to memory of 1844 548 Client.exe 131 PID 548 wrote to memory of 1844 548 Client.exe 131 PID 1844 wrote to memory of 4332 1844 cmd.exe 133 PID 1844 wrote to memory of 4332 1844 cmd.exe 133 PID 1844 wrote to memory of 1284 1844 cmd.exe 134 PID 1844 wrote to memory of 1284 1844 cmd.exe 134 PID 1844 wrote to memory of 1968 1844 cmd.exe 135 PID 1844 wrote to memory of 1968 1844 cmd.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\xenonew.exe"C:\Users\Admin\AppData\Local\Temp\xenonew.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4236
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7UWzM2VzME2O.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:1284
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2208
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Vjk56ZH8zYHd.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:4088
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4344
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:1320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\a04ZkgGk6ghc.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\chcp.comchcp 650018⤵PID:3948
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1540
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:1340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DXevDlc1pvgx.bat" "9⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4420
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:1436
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nfGI00sF3V1t.bat" "11⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\chcp.comchcp 6500112⤵PID:3328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:808
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:1244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dvVIHgwxHlwV.bat" "13⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\chcp.comchcp 6500114⤵PID:4332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1284
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1968 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KP6dOaQ8UlKo.bat" "15⤵PID:1776
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4892
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3600 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:2452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vZSA196xOb8R.bat" "17⤵PID:1304
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3824
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1104
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2876 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:4732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iOw3QMGlFMJV.bat" "19⤵PID:4296
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:3392
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3232
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3492 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:1340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KYKNDUpJ1JUO.bat" "21⤵PID:2144
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:2984
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4872
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3756 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:4908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\B5ECh1GggdXs.bat" "23⤵PID:3008
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:2376
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1960
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4812 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:5064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ysOe20PhUfs6.bat" "25⤵PID:3244
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:2640
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1840
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1172 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:4996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vl4ysJcWMm17.bat" "27⤵PID:2936
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3324
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3720
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4696 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:2300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oGCgszOmOTZZ.bat" "29⤵PID:4272
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:2304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:876
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:116 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:3864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZypI6MVk2kvK.bat" "31⤵PID:1068
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:2244
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58f0271a63446aef01cf2bfc7b7c7976b
SHA1b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7
SHA256da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c
SHA51278a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5
-
Filesize
207B
MD54325baa43825b172fb1408d09ee3147f
SHA178b17c7a2f4a0371737adef477cfa1cfd8b2a7d8
SHA2565ba83467afbed5b2a53eadeb36027b3d4011e0897c3656eb198d5e436e01684e
SHA51234bac8f94bf0091ecf186d214e7d099fe1e4e6ca77b36a225d478a4fd665ed289f14be05763583d81f949b5cedab67e141817a0d25624f261c3eed0f70e000b9
-
Filesize
207B
MD5d2e9cd05ead63495ce1e3cae39300b21
SHA1f5271640c3e4ad1f85ec68c89284203dbe09b3f1
SHA256bf2bdf9885aa051b63c8a761653db6c491ab3634c33454a962152aaf1ec9be9e
SHA512a73dc60312d8f0662d18927c4138d73fe193d71989ce83a24a81768421741a8ebf5347fe188f9c111ccd8cadb7e8681b7940c25d9297f32cbf725567ed8524cd
-
Filesize
207B
MD51d6af073ef030c56a526ddab2bcf53cd
SHA1d455256bb521a5f230805cc58e2010cec6d26c19
SHA2560c7daef89508d0d7d716048d03a3df423f7577f9558c14303c59ae80977e0cca
SHA512c579506e8698c9dec16bc94bb9bb8cb18bf7a85954d129860f91ec9bc811a4324fa338bc930f9e451a109025060f7656afaccbc7447d2efcdd739682a41d67ce
-
Filesize
207B
MD5d089ea735584f6afad0c73d4a6c0adff
SHA1b9aab85e1869a35b178f671a2a471da822e69ab5
SHA2567619386ba667510da01da942d98be45869a2791a1caaa2cd84363da671e86808
SHA5128e15493a3573fcd16aad0805f710081ec0d1b121d6c2c48962faf9d8b77a0c0fb57a8df506c1c613c404091b6115bf5082307fef7d5e117ac0a2738855a6db9e
-
Filesize
207B
MD5a76fefa98adad549237dc4bf94b2bc1b
SHA1d77ad0836b672016a321cbf9b2a02115da588442
SHA256b8346165bef823be8431fbc17fcc8d8f23ddc65638121d4e9f3f89a714bf9d23
SHA5129a000ac4b508f8a43e3231bef1119ae9527b41f58550bbb0217e557a323f2998674134e973d8f6dd790b78b7c627e006b4d8dfa3ba222090d058a5e60fca7d3a
-
Filesize
207B
MD5631fe1edcbad72cde2015fcf1976e591
SHA13554a5e1ab59558789892525116ed946d7716371
SHA256aa99dfba4cb18a5bb1bfb421e2f637919b1f10a9cff7a5c9b6f8c179a2bc7856
SHA5120afd3e7f716c5cb30bd698656a59bd1b905001df59c11718a96f2387892adfd5fba47a99fc304a1448886bc6440b2756254eef84337ae412d40832bb000ec380
-
Filesize
207B
MD562a792e0ad7304c5da214fd444b3c782
SHA1674b841ab9c34025bfa3a9615e7b38a87a3a9ce9
SHA2565b698481328c2f0fe302779d5a88f28959616e31c6b3ce025ddc6d5d0c0a493b
SHA5124ebbe7916d3b14f189cd0e4921a87003a2e6f123d4845c037f271ff3e96313010b73105b81bb96b1ae2aed5594b22ac80fb80039bc66e558e207a6f29141f040
-
Filesize
207B
MD5136c5acc6d10c6edefe9e625c75ef451
SHA1c7cab5ce3b48b1bcbbdebe86c48cf4f3564b5fec
SHA2569b53a2d227bddc5f4b7ccf99b7b8a8ed1fa6e1494bc794db980b4f367163169e
SHA512af15ff8219163a45938912eb7fd20914d782294a91e9587be40887c64ee708acf75495763ae07ea451003ed3dd2255417c65b1e2dfe9d32321e38a32ab023894
-
Filesize
207B
MD52f6359bdd8e399143a3f69ebed3ac269
SHA1d97aae2b0220c7559cc6f6b8bff895cc25f04dab
SHA2567a0c3a5ec070dbf2dd0388fb3b0b3f7774bbf89586d0ebb63ba04631db23b0ab
SHA51274b05fc66b9ed52041f1736264d94493ed6b374c0d3089a33daddc97e962485c2ffd6ad63853c717d97d75b733e17729daca6a6c6924be596c3031b906c43e0a
-
Filesize
207B
MD5b4aeadd9fd8238f7ff7ec1cb39da85e6
SHA1b6057bd4daacf167704286e4a9efd16097ff1f8a
SHA256214b41e8b6684f16dbe6e02b27c0087d6e489003e559190cd60d43b7bf77f92e
SHA512ddd52995d80ed5ccc6c5457670d449d8ad2361cb97466579ec667d003d7e7e7fed56e08bdb350b63223654d4bf1876eaa8f2b0502caca1e5aa0b139ef9100ad4
-
Filesize
207B
MD596acffada781e2f134004be7b6093277
SHA1b0931582900b7a54fa08c3ccfc7fa3c6ac420ba7
SHA256a3dda62fea921bece492c47ece41f318e66bf96689d26f587df3e7f6bd4d2d85
SHA51268417559fff4bf342ab6103ad250d14c68ca8ab973965cb40ef2a9928b88dec93b64f027f6128e8e886155c0457f1206956a8dc2cca0a87ba9516704bb7bdf47
-
Filesize
207B
MD5cc2e53463b44e852bdf7dbad1fc4757a
SHA129f6aa10c31d62396cd7c5914c2079877a96bac0
SHA25627a84ccc5c4f803a65888e937526cb1d296d4b6c3eb26b1db801069fe125f1af
SHA512662baa2d0cf7345f5518835a87d7270e8449738d323582d39071336c012f6ade3e616c70d69d19a8b171fe41db4b5850995c90b55be89f44109e0356757a6568
-
Filesize
207B
MD501d1f36df7d9e861f8c9a24212fcb8d7
SHA15a1f1fa659b4d5cabc6c641f6517f3d4225a5ec7
SHA2561316b3cc61a137213ce747a08c6dedfec5f035056ece6973665df4905f44fd67
SHA512eb5cb397f3040c0c434adbac7d73001b2f57ba6ecd9ce6d3e324ccdf7d95022789177aa3eca8a19170ed26a424605e15c607a7c8af1ab9e35196d6e4d7b348ef
-
Filesize
207B
MD52527eed6139729ac2332f49afece5695
SHA19af11e83a0e0424e54b45e6c3744da97a0c7a0ee
SHA2566670511eb21c79c936288228813a5d0d8027b9b4f064111c83cf8cb56490abaa
SHA512f19a6511ed42ccc9d08e767e31c3e9a6ab0c69bfd16a851e76cda2f1fc2d963c18a887f61c6b0f5a5284d29b26543e5342fd940d5df53f70b5d1e81443f16bbe
-
Filesize
207B
MD578fe456695c828120938c948316785fd
SHA1811b5fae69df523e8f9fa0cded646144fca0ad8c
SHA256373eb2a2cb3cd7b1e6d92f124567cb1bb3eafea3c43c8019875d19d88007074c
SHA51293dc59b625b19e6dd0f1fefb85c97a7829a64a3ff7d49f3b30723154050dc733a40c1a8e8b3d16a01e4ad454c2a72b43e672b1a8b76f3cff7d803fa95f05e482
-
Filesize
3.1MB
MD52d60a76ce3357eecb47f10d21ba01fb0
SHA11798a8dee078e7bd72296e79bbd2c2061d584fd7
SHA25655fd96a344bf6ccbf74dc7408f77f1080158fc2a0a20903b20e77a9cee2983d1
SHA512184f946295c7669f46a8fb878cb68bea943ed09c74cbd3588d4d7572295668edc8ba098f4e8c2deb21977d08ecc4b1f8e34376c4bb3074073e889864f04852e8