Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09-02-2025 20:58
Behavioral task
behavioral1
Sample
BoostrapperNew (1).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BoostrapperNew (1).exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
BoostrapperNew (1).exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral4
Sample
BoostrapperNew (1).exe
Resource
win11-20250207-en
Behavioral task
behavioral5
Sample
BoostrapperNew (1).exe
Resource
macos-20241101-en
General
-
Target
BoostrapperNew (1).exe
-
Size
3.1MB
-
MD5
5fa769f4592c691e1032917470a56012
-
SHA1
bc38e42f098176062b7ccd2bf92d3bf8b1893a78
-
SHA256
0ccd3733183706222509eb6d435010dbe60044b3f7c57bf70e2f78fa09ef8c24
-
SHA512
cd71cfb5a14070e1721a6557e7860affc6ae6d7c3067042e3d12e7b49bcdf0e630855362bb988180b8d781574205388fdc185158ed12ea9b4369100a628564ae
-
SSDEEP
49152:mv2I22SsaNYfdPBldt698dBcjHVrRJ6cbR3LoGdxjTHHB72eh2NT:mvb22SsaNYfdPBldt6+dBcjHVrRJ6m
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.236:4782
b796139d-9ac7-4dd6-b216-9d23cb27a8cf
-
encryption_key
A32C977AF70FAC39329AA4FE677FAA9E5BEB3D7E
-
install_name
BoostrapperNew.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WIN32
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral3/memory/4784-1-0x0000000000DD0000-0x00000000010F4000-memory.dmp family_quasar behavioral3/files/0x000a000000027e23-3.dat family_quasar -
Downloads MZ/PE file 1 IoCs
flow pid Process 14 1672 Process not Found -
Executes dropped EXE 1 IoCs
pid Process 4720 BoostrapperNew.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3044 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5088 schtasks.exe 4728 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4784 BoostrapperNew (1).exe Token: SeDebugPrivilege 4720 BoostrapperNew.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4720 BoostrapperNew.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4784 wrote to memory of 5088 4784 BoostrapperNew (1).exe 84 PID 4784 wrote to memory of 5088 4784 BoostrapperNew (1).exe 84 PID 4784 wrote to memory of 4720 4784 BoostrapperNew (1).exe 86 PID 4784 wrote to memory of 4720 4784 BoostrapperNew (1).exe 86 PID 4720 wrote to memory of 4728 4720 BoostrapperNew.exe 87 PID 4720 wrote to memory of 4728 4720 BoostrapperNew.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BoostrapperNew (1).exe"C:\Users\Admin\AppData\Local\Temp\BoostrapperNew (1).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WIN32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\BoostrapperNew.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:5088
-
-
C:\Users\Admin\AppData\Roaming\SubDir\BoostrapperNew.exe"C:\Users\Admin\AppData\Roaming\SubDir\BoostrapperNew.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WIN32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\BoostrapperNew.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4728
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MUVDRDM2MkItRDk0Qi00RkE1LUJBNjUtN0ZCODRCMjBDRDQyfSIgdXNlcmlkPSJ7OTRFQ0YxQTMtRjBEOC00N0I0LUJGRUEtMTBFQUMyMjU2NUNFfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MzA0NUE1REEtMTdCNS00OTI1LThBNUYtODg4MDU2MkY5MUYzfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0NC40NTI5IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iMTI1IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55fa769f4592c691e1032917470a56012
SHA1bc38e42f098176062b7ccd2bf92d3bf8b1893a78
SHA2560ccd3733183706222509eb6d435010dbe60044b3f7c57bf70e2f78fa09ef8c24
SHA512cd71cfb5a14070e1721a6557e7860affc6ae6d7c3067042e3d12e7b49bcdf0e630855362bb988180b8d781574205388fdc185158ed12ea9b4369100a628564ae