Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 02:28
Behavioral task
behavioral1
Sample
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe
Resource
win7-20241010-en
General
-
Target
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe
-
Size
3.1MB
-
MD5
21ce4cd2ce246c86222b57b93cdc92bd
-
SHA1
9dc24ad846b2d9db64e5bbea1977e23bb185d224
-
SHA256
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
-
SHA512
ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
-
SSDEEP
49152:DvTI22SsaNYfdPBldt698dBcjHZqS71J/ioGdRTTHHB72eh2NT:Dvs22SsaNYfdPBldt6+dBcjHZqSOB
Malware Config
Extracted
quasar
1.4.1
Office04
0.tcp.in.ngrok.io:14296
cc827307-beb6-456e-b5dd-e28a204ebd45
-
encryption_key
93486CAE624EBAD6626412E4A7DC6221B139DAA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/1656-1-0x0000000000390000-0x00000000006B4000-memory.dmp family_quasar -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 0.tcp.in.ngrok.io 48 0.tcp.in.ngrok.io 61 0.tcp.in.ngrok.io -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3012 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1656 273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1656 273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3012 1656 273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe 85 PID 1656 wrote to memory of 3012 1656 273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe"C:\Users\Admin\AppData\Local\Temp\273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3012
-