Analysis
-
max time kernel
58s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 15:37
Behavioral task
behavioral1
Sample
Client-built(1).exe
Resource
win7-20240903-en
General
-
Target
Client-built(1).exe
-
Size
3.1MB
-
MD5
3d821a2452c810ca043d7236a7f8c708
-
SHA1
b5098acfd5ac4315c6a8b62456e0fd96704bca1e
-
SHA256
294c268efe55818145590eb683f9df4fa627c16ce98a7edc3b961e63da818eca
-
SHA512
04984e86ef06e06b856e56d4376c1dbf5f47e1314336d6ecf208e64dcecebfa0daaf1b95f98a1209c23468bd97ce1d08b84547bd9e8d6f0fe02b2ac819b33034
-
SSDEEP
49152:Lv+lL26AaNeWgPhlmVqvMQ7XSKspDiEQsikCxSLoGNPPTHHB72eh2NT:LvuL26AaNeWgPhlmVqkQ7XSKspDuc
Malware Config
Extracted
quasar
1.4.1
Minecraft
rnyim-54-151-198-235.a.free.pinggy.link:43709
5720af06-b029-4d6b-b4d7-45b6532cef54
-
encryption_key
B81264084608EFD739EAF1A6BEDE545489766171
-
install_name
minecraft.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Intel Graphics Drivers
-
subdirectory
minecraft
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/1924-1-0x0000000000E70000-0x0000000001194000-memory.dmp family_quasar behavioral1/files/0x000700000001945c-6.dat family_quasar behavioral1/memory/2076-10-0x0000000000A30000-0x0000000000D54000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2076 minecraft.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe 2408 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1924 Client-built(1).exe Token: SeDebugPrivilege 2076 minecraft.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2076 minecraft.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2408 1924 Client-built(1).exe 30 PID 1924 wrote to memory of 2408 1924 Client-built(1).exe 30 PID 1924 wrote to memory of 2408 1924 Client-built(1).exe 30 PID 1924 wrote to memory of 2076 1924 Client-built(1).exe 32 PID 1924 wrote to memory of 2076 1924 Client-built(1).exe 32 PID 1924 wrote to memory of 2076 1924 Client-built(1).exe 32 PID 2076 wrote to memory of 2808 2076 minecraft.exe 33 PID 2076 wrote to memory of 2808 2076 minecraft.exe 33 PID 2076 wrote to memory of 2808 2076 minecraft.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built(1).exe"C:\Users\Admin\AppData\Local\Temp\Client-built(1).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Intel Graphics Drivers" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\minecraft\minecraft.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2408
-
-
C:\Users\Admin\AppData\Roaming\minecraft\minecraft.exe"C:\Users\Admin\AppData\Roaming\minecraft\minecraft.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Intel Graphics Drivers" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\minecraft\minecraft.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD53d821a2452c810ca043d7236a7f8c708
SHA1b5098acfd5ac4315c6a8b62456e0fd96704bca1e
SHA256294c268efe55818145590eb683f9df4fa627c16ce98a7edc3b961e63da818eca
SHA51204984e86ef06e06b856e56d4376c1dbf5f47e1314336d6ecf208e64dcecebfa0daaf1b95f98a1209c23468bd97ce1d08b84547bd9e8d6f0fe02b2ac819b33034