Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 02:21
Static task
static1
Behavioral task
behavioral1
Sample
1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe
Resource
win7-20240903-en
General
-
Target
1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe
-
Size
3.8MB
-
MD5
df29ee043d88f265cd76747f62ab3ea7
-
SHA1
0594a814e05c80618a72a865fa53d24fd351db5b
-
SHA256
1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0
-
SHA512
7826bc0582819fb165b25c21fd5a9385b47332201a464b8ae4a035d65f0b3c7ece75507ba0acfa92a6e8b55f2a18ba83344dbf3db264be7d43d3beb5796384a1
-
SSDEEP
98304:WhZ14lAzlFFzMsYLtZvQ1pVjLvAMQkWS27MtXE:WhZ1AAvFzMBNQTBIMQkXtX
Malware Config
Extracted
quasar
1.4.1
gasplant
toolsbox.ydns.eu:20901
33714128-68e4-4509-bd32-b7e414783d3eDtWike
-
encryption_key
43CBFE44C367A91A79A79C9E1778A82D0B498870
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral1/memory/2620-29-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2620-31-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2620-28-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2620-25-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar behavioral1/memory/2620-23-0x0000000000400000-0x0000000000724000-memory.dmp family_quasar -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2736 powershell.exe 2836 powershell.exe 2644 powershell.exe 2816 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2672 Client.exe 2164 Client.exe -
Loads dropped DLL 2 IoCs
pid Process 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 2672 Client.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2244 set thread context of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2672 set thread context of 2164 2672 Client.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe 2560 schtasks.exe 2912 schtasks.exe 1156 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2836 powershell.exe 2736 powershell.exe 2816 powershell.exe 2644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2164 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2164 Client.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2736 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 30 PID 2244 wrote to memory of 2736 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 30 PID 2244 wrote to memory of 2736 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 30 PID 2244 wrote to memory of 2736 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 30 PID 2244 wrote to memory of 2836 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 32 PID 2244 wrote to memory of 2836 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 32 PID 2244 wrote to memory of 2836 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 32 PID 2244 wrote to memory of 2836 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 32 PID 2244 wrote to memory of 2712 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 33 PID 2244 wrote to memory of 2712 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 33 PID 2244 wrote to memory of 2712 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 33 PID 2244 wrote to memory of 2712 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 33 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2244 wrote to memory of 2620 2244 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 36 PID 2620 wrote to memory of 2560 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 37 PID 2620 wrote to memory of 2560 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 37 PID 2620 wrote to memory of 2560 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 37 PID 2620 wrote to memory of 2560 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 37 PID 2620 wrote to memory of 2672 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 39 PID 2620 wrote to memory of 2672 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 39 PID 2620 wrote to memory of 2672 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 39 PID 2620 wrote to memory of 2672 2620 1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe 39 PID 2672 wrote to memory of 2644 2672 Client.exe 40 PID 2672 wrote to memory of 2644 2672 Client.exe 40 PID 2672 wrote to memory of 2644 2672 Client.exe 40 PID 2672 wrote to memory of 2644 2672 Client.exe 40 PID 2672 wrote to memory of 2816 2672 Client.exe 41 PID 2672 wrote to memory of 2816 2672 Client.exe 41 PID 2672 wrote to memory of 2816 2672 Client.exe 41 PID 2672 wrote to memory of 2816 2672 Client.exe 41 PID 2672 wrote to memory of 2912 2672 Client.exe 42 PID 2672 wrote to memory of 2912 2672 Client.exe 42 PID 2672 wrote to memory of 2912 2672 Client.exe 42 PID 2672 wrote to memory of 2912 2672 Client.exe 42 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2672 wrote to memory of 2164 2672 Client.exe 46 PID 2164 wrote to memory of 1156 2164 Client.exe 47 PID 2164 wrote to memory of 1156 2164 Client.exe 47 PID 2164 wrote to memory of 1156 2164 Client.exe 47 PID 2164 wrote to memory of 1156 2164 Client.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe"C:\Users\Admin\AppData\Local\Temp\1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OLHTuSLw.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OLHTuSLw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp822B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe"C:\Users\Admin\AppData\Local\Temp\1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OLHTuSLw.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OLHTuSLw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC5BF.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1156
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d25604e483873e89b7ba47a6be161da0
SHA1143b088a9a67a88d5291301b544267569a860327
SHA256b62b12f28e0c5faad697fe76010ecd1038f3317e34044536006cc1b8e858a5f5
SHA51284cb39fe4b6266073a6004068e5e7c3f24d15c01051b8c5711eba93cf9d20d1221992e2b6b272152045fa30391ea2f989f949fd7b6a453e0a375aae45a2a9945
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XI6DKFOX07B2ND9S2WS6.temp
Filesize7KB
MD55f8a1de9aa5c5b80632598654ddd001e
SHA1c2c363f7b6882196ad6ac50d2327268a5ea3318a
SHA256c4353c66eee6b774d898fa0caf5314548fa9f39505b16bb8006d5527a636fcde
SHA512cd9673923e4ffb910a12c12035d48c2b29e717f34a458431894a918a900d7ea578b1464b947545c3ede7dd572110aa7828fe4720c66b57ce3915349ffe85dd97
-
Filesize
3.8MB
MD5df29ee043d88f265cd76747f62ab3ea7
SHA10594a814e05c80618a72a865fa53d24fd351db5b
SHA2561528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0
SHA5127826bc0582819fb165b25c21fd5a9385b47332201a464b8ae4a035d65f0b3c7ece75507ba0acfa92a6e8b55f2a18ba83344dbf3db264be7d43d3beb5796384a1