Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 12:23

General

  • Target

    15a67fe07697ed47c8307e23665050ae7959575266053f3161019e96fb7fc909N.exe

  • Size

    786KB

  • MD5

    9c4894438cde81f24f332662f3c2aae0

  • SHA1

    0f4da3fd7ff45e65a13cfbc4268be143f9e9d7dd

  • SHA256

    15a67fe07697ed47c8307e23665050ae7959575266053f3161019e96fb7fc909

  • SHA512

    9448231e8619904ce115fd8b66488eef462f010dced19fc4ef2f327474b9019cac779e28b4fda2dda4cf8f0be4295b53014911831213a25eb925c9a555c1a30e

  • SSDEEP

    12288:SBMYGfKGK1IisTAkFTw7Z5LnZfHKVN88r0o5+593ZBIop2Eg6oXHQSSjl1HU:SxI1MnZfHKw8Be3ZGx36oXw9l10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

judicial.con-ip.com:53890

Mutex

cfa7b428-b778-4bda-8f78-8027f433ab1e

Attributes
  • encryption_key

    BCB3D7E61EBFADA295CE4E370B5FC34D54533AA8

  • install_name

    fdxfdx.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    fdxnvidia

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15a67fe07697ed47c8307e23665050ae7959575266053f3161019e96fb7fc909N.exe
    "C:\Users\Admin\AppData\Local\Temp\15a67fe07697ed47c8307e23665050ae7959575266053f3161019e96fb7fc909N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\NvG9EpvsI4Uz.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2444
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2488
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NvG9EpvsI4Uz.bat

    Filesize

    218B

    MD5

    a075b81096f62f90e1c0717524ebc1e4

    SHA1

    d76991e1f6d103396656111e420659da175c50c2

    SHA256

    30095dc5fb57f9ec3a4066152020164a9005a5e6758c5a839a615da5918538b3

    SHA512

    0609ae128a72ae4d684f08b5287bbca02c5b80903757b4822a2a507d417292d6dd7c67cbe839e50c18e13b009b246f5d0bda3b80aa70682e1ab6253ca4ddbb29

  • memory/2556-2-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2556-4-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2556-6-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2556-7-0x0000000074B2E000-0x0000000074B2F000-memory.dmp

    Filesize

    4KB

  • memory/2556-8-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-18-0x0000000074B20000-0x000000007520E000-memory.dmp

    Filesize

    6.9MB