Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 16:11
Behavioral task
behavioral1
Sample
Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe
Resource
win7-20240903-en
General
-
Target
Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe
-
Size
3.1MB
-
MD5
6d548f65275db48621c739026edba1d6
-
SHA1
7e8f3e64920984e407cfa5d257e67bfb885c67d8
-
SHA256
445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78
-
SHA512
c18b1593def2a6a1834016c61ba3be0bcd5e8dc37a5a889f1cbb924a252548ce3a5ac618a17c20112109015d509933a6a9c6823e437bf0e400f196de4f91266a
-
SSDEEP
49152:rvOI22SsaNYfdPBldt698dBcjHxuRJ6PbR3LoGdsnTHHB72eh2NT:rvj22SsaNYfdPBldt6+dBcjHxuRJ6h
Malware Config
Extracted
quasar
1.4.1
Office04
5.252.74.51:1337
c9ab7a3b-f343-40bc-bf8b-f072c9beccf5
-
encryption_key
22D8B6518A5AB3703F6FD0075F58F8B4DB404298
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2100-1-0x0000000000280000-0x00000000005A4000-memory.dmp family_quasar behavioral1/files/0x000800000001686c-6.dat family_quasar behavioral1/memory/2976-9-0x0000000000050000-0x0000000000374000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2976 Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2100 Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe Token: SeDebugPrivilege 2976 Client.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 Client.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2976 Client.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2976 2100 Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe 30 PID 2100 wrote to memory of 2976 2100 Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe 30 PID 2100 wrote to memory of 2976 2100 Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe"C:\Users\Admin\AppData\Local\Temp\Sigmanly_445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD56d548f65275db48621c739026edba1d6
SHA17e8f3e64920984e407cfa5d257e67bfb885c67d8
SHA256445933fc1bdf9469526b8b84c5d6453d1db0d7fefe24bf50af987e1dabc60c78
SHA512c18b1593def2a6a1834016c61ba3be0bcd5e8dc37a5a889f1cbb924a252548ce3a5ac618a17c20112109015d509933a6a9c6823e437bf0e400f196de4f91266a