Analysis
-
max time kernel
24s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 14:19
Behavioral task
behavioral1
Sample
Client-built10.exe
Resource
win7-20240903-en
General
-
Target
Client-built10.exe
-
Size
3.1MB
-
MD5
8b09b710cf79da2dbb54ac8548eee0ad
-
SHA1
b75efaae2675e05f51337bb1380c38b692074656
-
SHA256
f47017465588d49383d9bb5071956e251d4c2ab024270f97b6ba35a3e6e7dec8
-
SHA512
92e08ed6248f7e25e630dcfdfadeac8ada8a402def03da2c74c1d69455a8f0262648cb3b14195ea8b7cb7e1de8e510f9fdff897017db9babb675eebd6e07feb5
-
SSDEEP
49152:WvUt62XlaSFNWPjljiFa2RoUYIxC11JuAoGd/THHB72eh2NT:WvI62XlaSFNWPjljiFXRoUYIxCF
Malware Config
Extracted
quasar
1.4.1
kazeku
0.tcp.ap.ngrok.io:10431
7fb11f4b-e530-407c-a46c-8834ab5c4f45
-
encryption_key
2E002E0BA1D95CECCDECD8F8B383C3F7C76A7FD7
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
kazeku
-
subdirectory
kazeku
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2100-1-0x0000000000B70000-0x0000000000E94000-memory.dmp family_quasar behavioral1/files/0x000800000001686c-5.dat family_quasar behavioral1/memory/3036-8-0x0000000001190000-0x00000000014B4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3036 Client.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 0.tcp.ap.ngrok.io -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\kazeku\Client.exe Client-built10.exe File opened for modification C:\Program Files\kazeku\Client.exe Client-built10.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2976 schtasks.exe 2148 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2100 Client-built10.exe Token: SeDebugPrivilege 3036 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3036 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2976 2100 Client-built10.exe 30 PID 2100 wrote to memory of 2976 2100 Client-built10.exe 30 PID 2100 wrote to memory of 2976 2100 Client-built10.exe 30 PID 2100 wrote to memory of 3036 2100 Client-built10.exe 32 PID 2100 wrote to memory of 3036 2100 Client-built10.exe 32 PID 2100 wrote to memory of 3036 2100 Client-built10.exe 32 PID 3036 wrote to memory of 2148 3036 Client.exe 34 PID 3036 wrote to memory of 2148 3036 Client.exe 34 PID 3036 wrote to memory of 2148 3036 Client.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built10.exe"C:\Users\Admin\AppData\Local\Temp\Client-built10.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "kazeku" /sc ONLOGON /tr "C:\Program Files\kazeku\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2976
-
-
C:\Program Files\kazeku\Client.exe"C:\Program Files\kazeku\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "kazeku" /sc ONLOGON /tr "C:\Program Files\kazeku\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58b09b710cf79da2dbb54ac8548eee0ad
SHA1b75efaae2675e05f51337bb1380c38b692074656
SHA256f47017465588d49383d9bb5071956e251d4c2ab024270f97b6ba35a3e6e7dec8
SHA51292e08ed6248f7e25e630dcfdfadeac8ada8a402def03da2c74c1d69455a8f0262648cb3b14195ea8b7cb7e1de8e510f9fdff897017db9babb675eebd6e07feb5