Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 23:26
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241023-en
General
-
Target
Client-built.exe
-
Size
3.2MB
-
MD5
9829267eb5a37773b209963bbed9e419
-
SHA1
5d812309f2fe6b21fc0c8f5a5b84b19d2c5df121
-
SHA256
85f453be7ee3915a11d51992cb30135849abf25006668b2b2589bc96bdca5a20
-
SHA512
77aa1134121991fae234532f6ae754aecbc55784a60e229b0128a442004103486263b243168672c6552f3ab24cbf2a4a9209e8aaf05af0b24c9b9c4bffccdcd7
-
SSDEEP
98304:3vj52fyaSZOrPWluWBDG5g5h5ppFUHBp:fa+5xjU
Malware Config
Extracted
quasar
1.4.1
Office04
localhost:4782
e6dd4e3c-69b8-4cc3-bd87-255fbec8b149
-
encryption_key
3B9457A501B5D0EA09920FB91E1FFB2405E7981F
-
install_name
WinRAR.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WinRAR
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/684-1-0x0000000001210000-0x000000000154C000-memory.dmp family_quasar behavioral1/files/0x0008000000016b47-6.dat family_quasar behavioral1/memory/3068-9-0x00000000013A0000-0x00000000016DC000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3068 WinRAR.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2416 schtasks.exe 1028 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 684 Client-built.exe Token: SeDebugPrivilege 3068 WinRAR.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 684 wrote to memory of 2416 684 Client-built.exe 30 PID 684 wrote to memory of 2416 684 Client-built.exe 30 PID 684 wrote to memory of 2416 684 Client-built.exe 30 PID 684 wrote to memory of 3068 684 Client-built.exe 32 PID 684 wrote to memory of 3068 684 Client-built.exe 32 PID 684 wrote to memory of 3068 684 Client-built.exe 32 PID 3068 wrote to memory of 1028 3068 WinRAR.exe 33 PID 3068 wrote to memory of 1028 3068 WinRAR.exe 33 PID 3068 wrote to memory of 1028 3068 WinRAR.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "WinRAR" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WinRAR.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2416
-
-
C:\Users\Admin\AppData\Roaming\SubDir\WinRAR.exe"C:\Users\Admin\AppData\Roaming\SubDir\WinRAR.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "WinRAR" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WinRAR.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD59829267eb5a37773b209963bbed9e419
SHA15d812309f2fe6b21fc0c8f5a5b84b19d2c5df121
SHA25685f453be7ee3915a11d51992cb30135849abf25006668b2b2589bc96bdca5a20
SHA51277aa1134121991fae234532f6ae754aecbc55784a60e229b0128a442004103486263b243168672c6552f3ab24cbf2a4a9209e8aaf05af0b24c9b9c4bffccdcd7