Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 05:16
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
6d548f65275db48621c739026edba1d6
-
SHA1
7e8f3e64920984e407cfa5d257e67bfb885c67d8
-
SHA256
445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78
-
SHA512
c18b1593def2a6a1834016c61ba3be0bcd5e8dc37a5a889f1cbb924a252548ce3a5ac618a17c20112109015d509933a6a9c6823e437bf0e400f196de4f91266a
-
SSDEEP
49152:rvOI22SsaNYfdPBldt698dBcjHxuRJ6PbR3LoGdsnTHHB72eh2NT:rvj22SsaNYfdPBldt6+dBcjHxuRJ6h
Malware Config
Extracted
quasar
1.4.1
Office04
5.252.74.51:1337
c9ab7a3b-f343-40bc-bf8b-f072c9beccf5
-
encryption_key
22D8B6518A5AB3703F6FD0075F58F8B4DB404298
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2252-1-0x00000000003A0000-0x00000000006C4000-memory.dmp family_quasar behavioral1/files/0x0034000000016d17-6.dat family_quasar behavioral1/memory/2092-8-0x00000000001E0000-0x0000000000504000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2092 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2252 Client-built.exe Token: SeDebugPrivilege 2092 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2092 Client.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2092 2252 Client-built.exe 28 PID 2252 wrote to memory of 2092 2252 Client-built.exe 28 PID 2252 wrote to memory of 2092 2252 Client-built.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56d548f65275db48621c739026edba1d6
SHA17e8f3e64920984e407cfa5d257e67bfb885c67d8
SHA256445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78
SHA512c18b1593def2a6a1834016c61ba3be0bcd5e8dc37a5a889f1cbb924a252548ce3a5ac618a17c20112109015d509933a6a9c6823e437bf0e400f196de4f91266a