Analysis
-
max time kernel
18s -
max time network
16s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12/01/2025, 00:25
General
-
Target
anotherport.exe
-
Size
3.1MB
-
MD5
886cbf1c76a1c72243b8b5b09d8130bf
-
SHA1
294ec2078c9d08f907f8c7bfb5559e5748949c9f
-
SHA256
af68c805613ad9d44fe9e4bc4ccd30ba8d374b6faf129a7210c6384416be3ef9
-
SHA512
afa34cbda23d4be19c8cb940f2708eee6c3eb67c98cf2a3264a8f6b33b7ed2989be150eb62ef396eaabd73105bd5be1ea3bdc5b5834d772e5342a5f3c083fc34
-
SSDEEP
49152:DvGI22SsaNYfdPBldt698dBcjH4Q8RJ6KbR3LoGdpKTHHB72eh2NT:DvL22SsaNYfdPBldt6+dBcjH4Q8RJ6k
Malware Config
Extracted
quasar
1.4.1
Axotrojan
193.161.193.99:46972
26f86d86-6a8f-46ae-bb91-fc1127efd3f6
-
encryption_key
4B13DC71783277444E966E1D66F9171ABFC15E88
-
install_name
Clientformyslut.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Axo startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3548-1-0x0000000000290000-0x00000000005B4000-memory.dmp family_quasar behavioral1/files/0x0029000000046093-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 564 Clientformyslut.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\SubDir\Clientformyslut.exe anotherport.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe 4808 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3548 anotherport.exe Token: SeDebugPrivilege 564 Clientformyslut.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 564 Clientformyslut.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3548 wrote to memory of 5036 3548 anotherport.exe 82 PID 3548 wrote to memory of 5036 3548 anotherport.exe 82 PID 3548 wrote to memory of 564 3548 anotherport.exe 84 PID 3548 wrote to memory of 564 3548 anotherport.exe 84 PID 564 wrote to memory of 4808 564 Clientformyslut.exe 85 PID 564 wrote to memory of 4808 564 Clientformyslut.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\anotherport.exe"C:\Users\Admin\AppData\Local\Temp\anotherport.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Axo startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Clientformyslut.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:5036
-
-
C:\Windows\system32\SubDir\Clientformyslut.exe"C:\Windows\system32\SubDir\Clientformyslut.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Axo startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Clientformyslut.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5886cbf1c76a1c72243b8b5b09d8130bf
SHA1294ec2078c9d08f907f8c7bfb5559e5748949c9f
SHA256af68c805613ad9d44fe9e4bc4ccd30ba8d374b6faf129a7210c6384416be3ef9
SHA512afa34cbda23d4be19c8cb940f2708eee6c3eb67c98cf2a3264a8f6b33b7ed2989be150eb62ef396eaabd73105bd5be1ea3bdc5b5834d772e5342a5f3c083fc34