Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-01-2025 13:09
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
5ff1c7a31e2aeb8f5e998884bd5bcdd3
-
SHA1
f02a220ced830d2ac29d42a3cc4c72a68b9f4068
-
SHA256
45a7baa72cc53ffec5c9c7c8f4bef8ca6323f24a43c6f0baec29c70f3bbfce35
-
SHA512
47ab416e032b917745acb7720411280803676ba63ef195a58786b3a0cba4803d88816e8ae740181e0af8ee1e7bd9dfe3aecfc26a806d19a6efc5e2c1ed4a38d2
-
SSDEEP
49152:uvIt62XlaSFNWPjljiFa2RoUYI9P541vSLomdeTHHB72eh2NT:uvE62XlaSFNWPjljiFXRoUYI9P59
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.56.1:4782
4933039f-7ad7-40a8-b70d-365558f6056c
-
encryption_key
EA7BEE3E368EF7D787AB8E01A4A119314D7B324C
-
install_name
nigga.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
niggas
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/2644-1-0x0000000000E40000-0x0000000001164000-memory.dmp family_quasar behavioral1/files/0x002800000004619c-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 1120 nigga.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2344 schtasks.exe 1152 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 Client-built.exe Token: SeDebugPrivilege 1120 nigga.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1152 2644 Client-built.exe 85 PID 2644 wrote to memory of 1152 2644 Client-built.exe 85 PID 2644 wrote to memory of 1120 2644 Client-built.exe 87 PID 2644 wrote to memory of 1120 2644 Client-built.exe 87 PID 1120 wrote to memory of 2344 1120 nigga.exe 88 PID 1120 wrote to memory of 2344 1120 nigga.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "niggas" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1152
-
-
C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe"C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "niggas" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2344
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\SyncResume.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- System Location Discovery: System Language Discovery
PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55ff1c7a31e2aeb8f5e998884bd5bcdd3
SHA1f02a220ced830d2ac29d42a3cc4c72a68b9f4068
SHA25645a7baa72cc53ffec5c9c7c8f4bef8ca6323f24a43c6f0baec29c70f3bbfce35
SHA51247ab416e032b917745acb7720411280803676ba63ef195a58786b3a0cba4803d88816e8ae740181e0af8ee1e7bd9dfe3aecfc26a806d19a6efc5e2c1ed4a38d2