Analysis
-
max time kernel
888s -
max time network
897s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-01-2025 13:11
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
5ff1c7a31e2aeb8f5e998884bd5bcdd3
-
SHA1
f02a220ced830d2ac29d42a3cc4c72a68b9f4068
-
SHA256
45a7baa72cc53ffec5c9c7c8f4bef8ca6323f24a43c6f0baec29c70f3bbfce35
-
SHA512
47ab416e032b917745acb7720411280803676ba63ef195a58786b3a0cba4803d88816e8ae740181e0af8ee1e7bd9dfe3aecfc26a806d19a6efc5e2c1ed4a38d2
-
SSDEEP
49152:uvIt62XlaSFNWPjljiFa2RoUYI9P541vSLomdeTHHB72eh2NT:uvE62XlaSFNWPjljiFXRoUYI9P59
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.56.1:4782
4933039f-7ad7-40a8-b70d-365558f6056c
-
encryption_key
EA7BEE3E368EF7D787AB8E01A4A119314D7B324C
-
install_name
nigga.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
niggas
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3984-1-0x0000000000C50000-0x0000000000F74000-memory.dmp family_quasar behavioral1/files/0x0028000000046157-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 64 nigga.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4364 schtasks.exe 2804 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3984 Client-built.exe Token: SeDebugPrivilege 64 nigga.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3984 wrote to memory of 4364 3984 Client-built.exe 85 PID 3984 wrote to memory of 4364 3984 Client-built.exe 85 PID 3984 wrote to memory of 64 3984 Client-built.exe 87 PID 3984 wrote to memory of 64 3984 Client-built.exe 87 PID 64 wrote to memory of 2804 64 nigga.exe 90 PID 64 wrote to memory of 2804 64 nigga.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "niggas" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4364
-
-
C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe"C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "niggas" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\nigga.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55ff1c7a31e2aeb8f5e998884bd5bcdd3
SHA1f02a220ced830d2ac29d42a3cc4c72a68b9f4068
SHA25645a7baa72cc53ffec5c9c7c8f4bef8ca6323f24a43c6f0baec29c70f3bbfce35
SHA51247ab416e032b917745acb7720411280803676ba63ef195a58786b3a0cba4803d88816e8ae740181e0af8ee1e7bd9dfe3aecfc26a806d19a6efc5e2c1ed4a38d2