Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2025 01:16

General

  • Target

    Captura de Pantalla de PAGO.exe

  • Size

    946KB

  • MD5

    c7a177d2b04341c5e21ca7cf9f6000db

  • SHA1

    828a9d4041466f2e2f76b6ffcf641ac3814e7156

  • SHA256

    745b2a241f10dabbb5acd2abeb3c3b2df7ba525e4fae03e9de11efe5adb082d3

  • SHA512

    c07564d27f7c18264eb8145c20f3bb62da6e3e05b66836341a19ca0a2f6a889651a43357c15b618b0b578c9a0458ca6dc6aecf968404fea17f7865758c225bb5

  • SSDEEP

    24576:XRejzEhR4yfC6j7S9beD5M/+DnY7YpVbi2y:XRej4hWYCO7S9beDW8nhpV+7

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Stroy

C2

109.248.151.166:61537

Mutex

QSR_MUTEX_uHD8seWaFzpqqYxRLX

Attributes
  • encryption_key

    IR3AcRhjtuelpwNmTP7v

  • install_name

    Updater.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    Windows

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Captura de Pantalla de PAGO.exe
    "C:\Users\Admin\AppData\Local\Temp\Captura de Pantalla de PAGO.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Users\Admin\AppData\Local\Temp\Captura de Pantalla de PAGO.exe
      "C:\Users\Admin\AppData\Local\Temp\Captura de Pantalla de PAGO.exe"
      2⤵
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\Captura de Pantalla de PAGO.exe
        "C:\Users\Admin\AppData\Local\Temp\Captura de Pantalla de PAGO.exe"
        2⤵
          PID:2416

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2836-0-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

        Filesize

        4KB

      • memory/2836-1-0x0000000000360000-0x0000000000452000-memory.dmp

        Filesize

        968KB

      • memory/2836-2-0x0000000006F50000-0x0000000007060000-memory.dmp

        Filesize

        1.1MB

      • memory/2836-3-0x0000000073EF0000-0x00000000745DE000-memory.dmp

        Filesize

        6.9MB

      • memory/2836-8-0x0000000073EF0000-0x00000000745DE000-memory.dmp

        Filesize

        6.9MB

      • memory/3000-5-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB