Analysis
-
max time kernel
739s -
max time network
749s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 16:23
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
d99d7d556d5021fbd6926bc2dbf937cb
-
SHA1
a84dba6c50fb7a9fb96a88034a0b0beca902d816
-
SHA256
a94e45818c0b816f85d0c2608c0a1b03e75090b2c5930f20a42c7d127579e5e9
-
SHA512
41b1f8b7887d6288bdc868ce941c2368e576503c272e0a48f9c662e67ee253ea62c5cef3a34a25d15515e37175465c281f8219450542c18db7d5326423cae8c9
-
SSDEEP
49152:Wvkt62XlaSFNWPjljiFa2RoUYI59RJ6ubR3LoGdroTHHB72eh2NT:Wv462XlaSFNWPjljiFXRoUYI59RJ6ob
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.20:4782
09fd8aa4-f8ef-40d0-96f7-029c82b74a3a
-
encryption_key
5FA4C5B780FA0149296752FBE0A794A5BF0E5B11
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
dont mind this
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2880-1-0x0000000000B90000-0x0000000000EB4000-memory.dmp family_quasar behavioral1/files/0x0008000000016dd0-6.dat family_quasar behavioral1/memory/2836-10-0x0000000000920000-0x0000000000C44000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 2836 Client.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe 2740 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2880 Client-built.exe Token: SeDebugPrivilege 2836 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2836 Client.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2880 wrote to memory of 320 2880 Client-built.exe 31 PID 2880 wrote to memory of 320 2880 Client-built.exe 31 PID 2880 wrote to memory of 320 2880 Client-built.exe 31 PID 2880 wrote to memory of 2836 2880 Client-built.exe 33 PID 2880 wrote to memory of 2836 2880 Client-built.exe 33 PID 2880 wrote to memory of 2836 2880 Client-built.exe 33 PID 2836 wrote to memory of 2740 2836 Client.exe 34 PID 2836 wrote to memory of 2740 2836 Client.exe 34 PID 2836 wrote to memory of 2740 2836 Client.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "dont mind this " /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:320
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "dont mind this " /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2740
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d99d7d556d5021fbd6926bc2dbf937cb
SHA1a84dba6c50fb7a9fb96a88034a0b0beca902d816
SHA256a94e45818c0b816f85d0c2608c0a1b03e75090b2c5930f20a42c7d127579e5e9
SHA51241b1f8b7887d6288bdc868ce941c2368e576503c272e0a48f9c662e67ee253ea62c5cef3a34a25d15515e37175465c281f8219450542c18db7d5326423cae8c9