Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
7a56b9a7be5d627a61b4fcd3716b73aefa76ecbe38c8edc5c11b47dedb3b888b.exe
-
Size
6.7MB
-
Sample
250322-ggcgjsywdv
-
MD5
818c5a007a2075f7c56eb69b75d12acb
-
SHA1
2f33d50e879a18ff744424855d6356bae8f2d5d9
-
SHA256
79712e68d88a6d2d87555f24f9dc767868289ce0e70000c14e3e72df1b4a58f9
-
SHA512
f15717749deac968f48ac8c5df01368735658eca535efa19c1b5c2bcb3a1b1f065baa05b609b6526c384a6800b78adccfc8249aab8e7ce411041575303da8ec4
-
SSDEEP
196608:hwy9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDSy3n1B:hwykYVI5DK2NNs6LtYdEhSp24B
Behavioral task
behavioral1
Sample
7a56b9a7be5d627a61b4fcd3716b73aefa76ecbe38c8edc5c11b47dedb3b888b.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Extracted
quasar
1.5.0
Office04
movies-concerning.gl.at.ply.gg:12712
5f7b0195-4eaf-4ae9-b4f8-cc2f6f6c4eb3
-
encryption_key
27AAC11A05508545506D258070495FCDA9A82735
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
7a56b9a7be5d627a61b4fcd3716b73aefa76ecbe38c8edc5c11b47dedb3b888b.exe
-
Size
6.7MB
-
MD5
818c5a007a2075f7c56eb69b75d12acb
-
SHA1
2f33d50e879a18ff744424855d6356bae8f2d5d9
-
SHA256
79712e68d88a6d2d87555f24f9dc767868289ce0e70000c14e3e72df1b4a58f9
-
SHA512
f15717749deac968f48ac8c5df01368735658eca535efa19c1b5c2bcb3a1b1f065baa05b609b6526c384a6800b78adccfc8249aab8e7ce411041575303da8ec4
-
SSDEEP
196608:hwy9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDSy3n1B:hwykYVI5DK2NNs6LtYdEhSp24B
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1