Analysis
-
max time kernel
888s -
max time network
896s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-de -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-delocale:de-deos:windows10-ltsc 2021-x64systemwindows -
submitted
25-01-2025 17:11
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
71237ace600401ba52dfea1b658e9edf
-
SHA1
b437fd48edf8700d0d873f8670c93ec787562d1c
-
SHA256
cc92d78ae16a55b1f74cf051ae5098e5cee90949202ebf2272573c1cd9e915bf
-
SHA512
7b560206139607b7f901c5b2126ca0d0e232e32a22b995c79a1df8a645a8ebf3f33e83136a563073b4606b76a80f4e2ba7b4edd41d3353e694120385d72d0efe
-
SSDEEP
49152:DvnI22SsaNYfdPBldt698dBcjH0WrWqbartOoGdYTHHB72eh2NT:DvI22SsaNYfdPBldt6+dBcjHdiqb
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.178.56:4782
0552115c-2459-453f-980d-c60aebb9957e
-
encryption_key
1DEED326568BA39A5A6D6473414A146E2A7F5724
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3296-1-0x0000000000BF0000-0x0000000000F14000-memory.dmp family_quasar behavioral1/files/0x002800000004612d-3.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2448 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3296 Client-built.exe Token: SeDebugPrivilege 2448 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2448 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2448 Client.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3296 wrote to memory of 2448 3296 Client-built.exe 82 PID 3296 wrote to memory of 2448 3296 Client-built.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD571237ace600401ba52dfea1b658e9edf
SHA1b437fd48edf8700d0d873f8670c93ec787562d1c
SHA256cc92d78ae16a55b1f74cf051ae5098e5cee90949202ebf2272573c1cd9e915bf
SHA5127b560206139607b7f901c5b2126ca0d0e232e32a22b995c79a1df8a645a8ebf3f33e83136a563073b4606b76a80f4e2ba7b4edd41d3353e694120385d72d0efe