Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 12:20
Behavioral task
behavioral1
Sample
22ec96463885b4d35adc2f655171c3d985d48e69061542a2e87af651fe4cb5bc.exe
Resource
win7-20240708-en
General
-
Target
22ec96463885b4d35adc2f655171c3d985d48e69061542a2e87af651fe4cb5bc.exe
-
Size
3.1MB
-
MD5
a4ad38d230708b778ccfaed3e2f21d76
-
SHA1
5a1fc3eb971ab76dd10b42cd1d1ee512834ac1c2
-
SHA256
22ec96463885b4d35adc2f655171c3d985d48e69061542a2e87af651fe4cb5bc
-
SHA512
3661ae30a238917f1406cf969f0d6b36ef50e6ec0c14c761c5028da437ce907096075464d15128375d0337b36c70be9d8aa34ee1334539a9dd28b77167632393
-
SSDEEP
49152:SvMI22SsaNYfdPBldt698dBcjHwkxXvlYYoGdFTHHB72eh2NTw:Svh22SsaNYfdPBldt6+dBcjHwkxXvlDv
Malware Config
Extracted
quasar
1.4.1
NEWEST
154.216.20.177:3671
19fe5d5f-e5a0-498d-a3be-9e9a0724595d
-
encryption_key
2FD973A7D27B4716D866343EEDC06E9720A3448B
-
install_name
Client.exe
-
log_directory
wawa
-
reconnect_delay
300
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/3060-1-0x00000000012F0000-0x0000000001616000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 22ec96463885b4d35adc2f655171c3d985d48e69061542a2e87af651fe4cb5bc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 22ec96463885b4d35adc2f655171c3d985d48e69061542a2e87af651fe4cb5bc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ec96463885b4d35adc2f655171c3d985d48e69061542a2e87af651fe4cb5bc.exe"C:\Users\Admin\AppData\Local\Temp\22ec96463885b4d35adc2f655171c3d985d48e69061542a2e87af651fe4cb5bc.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3060