Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250207-en
  • resource tags

    arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-02-2025 19:08

General

  • Target

    Quasar v1.4.1/client.exe

  • Size

    3.1MB

  • MD5

    f4d16cfe4cad388255e43f258329f805

  • SHA1

    fe7cc6c9eb76b5ad97867b46d053fae601fd4a2d

  • SHA256

    8fb6ae3496d4ac025eab443d3e322b0faa3461d25b54093c9205d35746e3250e

  • SHA512

    867045eac0f7765e6bea51e62bc4ed68b1e81ce6c2843d2e08714eb391a8ac94c2571c09828286252248400ea5c12bffa50a25c8ec5ad9e6d0bb836320ec188f

  • SSDEEP

    49152:4nb7+y2FqZaVmN+PqlhU/mevlL1nYtsCeAcxUuxG2THHB72eh2NT:4nf+y2FqZaVmN+PqlhU//vlL1Yts3Bx

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\client.exe
    "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\client.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4864
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4864-0-0x00007FFD177F3000-0x00007FFD177F5000-memory.dmp

    Filesize

    8KB

  • memory/4864-1-0x0000000000BB0000-0x0000000000EDA000-memory.dmp

    Filesize

    3.2MB

  • memory/4864-3-0x00007FFD177F0000-0x00007FFD182B2000-memory.dmp

    Filesize

    10.8MB

  • memory/4864-4-0x00007FFD177F0000-0x00007FFD182B2000-memory.dmp

    Filesize

    10.8MB