Analysis
-
max time kernel
127s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 08:50
Static task
static1
Behavioral task
behavioral1
Sample
6Pax trip details.xlsx.exe
Resource
win7-20240903-en
General
-
Target
6Pax trip details.xlsx.exe
-
Size
566KB
-
MD5
cb2d2a48d646ebb9c773171d92b5bc41
-
SHA1
5e075d1420f4a631175ae31ef5261e4a87026c66
-
SHA256
4f795fed198da9f27a68dd60cb478ef768764da2f9d141e94c5f2624c85d4b13
-
SHA512
fe7f0741d71ee678a1b71a9cd33afe42cbfcd5741209b5bf838e7ae17ba2e13f161ea7a55b4eb2f08c7f749409d4dda32a2e040a725e13c7ae5b5c8526a9fcb9
-
SSDEEP
6144:csLsuwSdHTYloqvGyHJxnDrkbpvSU+fLN/+1n48qkEBmjbu60LROa+En4:XUszYloqvGdlaNLs4Ru3u60RO
Malware Config
Extracted
quasar
1.3.0.0
ACS hope
crazydns.linkpc.net:26133
QSR_MUTEX_6iGAmxpR39hpOQEFqk
-
encryption_key
qiJ37BhO6EEtAoSo8ukb
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral1/memory/2892-9-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/2892-13-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/2892-11-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/2892-7-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar behavioral1/memory/2892-6-0x0000000000400000-0x000000000045E000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2136 set thread context of 2892 2136 6Pax trip details.xlsx.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Caspol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2892 Caspol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 Caspol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31 PID 2136 wrote to memory of 2892 2136 6Pax trip details.xlsx.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6Pax trip details.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\6Pax trip details.xlsx.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2892
-