Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/03/2025, 00:19

General

  • Target

    Client-built.exe

  • Size

    1.3MB

  • MD5

    24c71e4e30536468929c5389a89b362c

  • SHA1

    d5b89ee8a110431c464170cad3b3ab3aac8a579f

  • SHA256

    d95db1b044e9f20d4d56ff93904dadf7272ce22c1dd2b625443636e90d0ba3e5

  • SHA512

    77d2b579303d5cd250f5f58c78915e9711f6d5b669d1fe582fcac01bba9e5bc73de2018326a139770bad2d96d81a2e5f5f55cf3ba3eafd8b3b859ed0f2598a2f

  • SSDEEP

    24576:tWO+qYjCoYsv+H5meSWHIPbcNK0KKfaOwI55l2SVcwVN/dEfVKfjFq:tWLx8EgKKHwCBVcEjiKfj

Malware Config

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

147.185.221.26:12171

Mutex

87f86d42-0aec-44a5-b746-a8803e2e4ead

Attributes
  • encryption_key

    251B3D6D57078758B504E154DF6317D159089F09

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Update

  • subdirectory

    en-AR

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Checks for VirtualBox DLLs, possible anti-VM trick
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-0-0x00007FFAAB053000-0x00007FFAAB055000-memory.dmp

    Filesize

    8KB

  • memory/1680-1-0x000001597D030000-0x000001597D184000-memory.dmp

    Filesize

    1.3MB

  • memory/1680-2-0x000001597D5C0000-0x000001597D5DA000-memory.dmp

    Filesize

    104KB

  • memory/1680-3-0x00007FFAAB050000-0x00007FFAABB12000-memory.dmp

    Filesize

    10.8MB

  • memory/1680-4-0x00007FFAAB050000-0x00007FFAABB12000-memory.dmp

    Filesize

    10.8MB