Analysis

  • max time kernel
    123s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-01-2025 12:33

General

  • Target

    Quasar v1.4.1/Quasar.exe

  • Size

    1.2MB

  • MD5

    12ebf922aa80d13f8887e4c8c5e7be83

  • SHA1

    7f87a80513e13efd45175e8f2511c2cd17ff51e8

  • SHA256

    43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

  • SHA512

    fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

  • SSDEEP

    12288:IwPs012cBBBYiL9l/bFfpBBBBBBBBBBBBcA:jBBBYiLvzFfpBBBBBBBBBBBBcA

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe
    "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" /select, "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12"
      2⤵
        PID:2696
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2064
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1588

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12

        Filesize

        4KB

        MD5

        4be2401dc59f5c710fee3a1b0c56d569

        SHA1

        746a9261922dbaa4fa1e08b71c3bd75eeb70384a

        SHA256

        ce14204107a067232c2ccbe963318e989d59fccf15f32fa4d93b03455c6f9a3b

        SHA512

        db05bca6e7387c3d2dc79cbbf685ba316c9d869ba80250dc3f031252b1696711792fa009d0f125f5c2f613c0134a15b4108c18417dd14b33ea099d7c613eee8e

      • memory/2488-8-0x000001F1D1D70000-0x000001F1D209E000-memory.dmp

        Filesize

        3.2MB

      • memory/2488-7-0x00007FFE9D990000-0x00007FFE9E452000-memory.dmp

        Filesize

        10.8MB

      • memory/2488-3-0x00007FFE9D990000-0x00007FFE9E452000-memory.dmp

        Filesize

        10.8MB

      • memory/2488-4-0x00007FFE9D990000-0x00007FFE9E452000-memory.dmp

        Filesize

        10.8MB

      • memory/2488-14-0x00007FFE9D990000-0x00007FFE9E452000-memory.dmp

        Filesize

        10.8MB

      • memory/2488-6-0x00007FFE9D993000-0x00007FFE9D995000-memory.dmp

        Filesize

        8KB

      • memory/2488-2-0x000001F1B52F0000-0x000001F1B5306000-memory.dmp

        Filesize

        88KB

      • memory/2488-0-0x00007FFE9D993000-0x00007FFE9D995000-memory.dmp

        Filesize

        8KB

      • memory/2488-5-0x00007FFE9D990000-0x00007FFE9E452000-memory.dmp

        Filesize

        10.8MB

      • memory/2488-1-0x000001F1B4D30000-0x000001F1B4E68000-memory.dmp

        Filesize

        1.2MB

      • memory/2488-29-0x000001F1D1980000-0x000001F1D1998000-memory.dmp

        Filesize

        96KB

      • memory/2488-30-0x000001F1D3650000-0x000001F1D36A0000-memory.dmp

        Filesize

        320KB

      • memory/2488-31-0x000001F1D3760000-0x000001F1D3812000-memory.dmp

        Filesize

        712KB

      • memory/2488-32-0x000001F1D36A0000-0x000001F1D36EC000-memory.dmp

        Filesize

        304KB

      • memory/2488-33-0x00007FFE9D990000-0x00007FFE9E452000-memory.dmp

        Filesize

        10.8MB

      • memory/2488-37-0x00007FFE9D990000-0x00007FFE9E452000-memory.dmp

        Filesize

        10.8MB