Analysis
-
max time kernel
1033s -
max time network
1043s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/01/2025, 08:05 UTC
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
e95dbcf6b36ef995310b6eaf26ebe3f7
-
SHA1
34fab34a2311b2c67ca62e17f368a9e45390e32a
-
SHA256
d28acb4d213710a1244890036bdf80713c4a33584e8036d379802c1881e90f24
-
SHA512
87064ecafbd5c2bf2d3c2d5944568b6c8860d62081210fc8f1000269b4d280958e96ece246379c7de43c83c28aabd59463777a7056d93f6de026d8d2c61c85e4
-
SSDEEP
49152:bvyI22SsaNYfdPBldt698dBcjHlVSl1J/CoGdPTHHB72eh2NT:bvf22SsaNYfdPBldt6+dBcjHlVS0
Malware Config
Extracted
quasar
1.4.1
Myscasmmer
192.168.0.26:4782
eb08c9a6-9a1e-4b9d-a7ab-8e6e44c6fc66
-
encryption_key
2E42F13569D1CAF4CA99640EB8D8A7A5AA13B260
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/796-1-0x0000000001080000-0x00000000013A4000-memory.dmp family_quasar behavioral1/files/0x0008000000016210-6.dat family_quasar behavioral1/memory/1572-10-0x0000000000E70000-0x0000000001194000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1572 Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2296 schtasks.exe 2408 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 796 Client-built.exe Token: SeDebugPrivilege 1572 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1572 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 796 wrote to memory of 2296 796 Client-built.exe 28 PID 796 wrote to memory of 2296 796 Client-built.exe 28 PID 796 wrote to memory of 2296 796 Client-built.exe 28 PID 796 wrote to memory of 1572 796 Client-built.exe 30 PID 796 wrote to memory of 1572 796 Client-built.exe 30 PID 796 wrote to memory of 1572 796 Client-built.exe 30 PID 1572 wrote to memory of 2408 1572 Client.exe 31 PID 1572 wrote to memory of 2408 1572 Client.exe 31 PID 1572 wrote to memory of 2408 1572 Client.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2296
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2408
-
-
Network
- No results found
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5e95dbcf6b36ef995310b6eaf26ebe3f7
SHA134fab34a2311b2c67ca62e17f368a9e45390e32a
SHA256d28acb4d213710a1244890036bdf80713c4a33584e8036d379802c1881e90f24
SHA51287064ecafbd5c2bf2d3c2d5944568b6c8860d62081210fc8f1000269b4d280958e96ece246379c7de43c83c28aabd59463777a7056d93f6de026d8d2c61c85e4