Analysis

  • max time kernel
    101s
  • max time network
    105s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 04:37

General

  • Target

    pt3FUor71KhFxRI.exe

  • Size

    1.6MB

  • MD5

    07cabbbc11af08a2c4540c0fa2cff498

  • SHA1

    78694904ffd774102ed8a7956971009aeb014356

  • SHA256

    0be5a8e4d80353ec3e852df8da35a05138978ea6fb7b8cb10f244f709e170be0

  • SHA512

    cc0df894db716b74f7d33e375cb66c0fbafb31f4bcc4cef937aea0038681acfb086f8c9660d9603d6ce5506bb615f01ddfb869cbc3ac5c1f444b042cc6c513d9

  • SSDEEP

    49152:rq4H/Y6gY9W3M4xtJXYDjf9Gjyl4h2iKw:24HwAW3JxDUQ+l4giKw

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pt3FUor71KhFxRI.exe
    "C:\Users\Admin\AppData\Local\Temp\pt3FUor71KhFxRI.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Users\Admin\AppData\Local\Temp\pt3FUor71KhFxRI.exe
      "C:\Users\Admin\AppData\Local\Temp\pt3FUor71KhFxRI.exe"
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Windows Repair Tool" /sc ONLOGON /tr "C:\Windows\system32\SubDir\svchost.exe" /rl HIGHEST /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2212
      • C:\Windows\SysWOW64\SubDir\svchost.exe
        "C:\Windows\system32\SubDir\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\SubDir\svchost.exe
          "C:\Windows\SysWOW64\SubDir\svchost.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pt3FUor71KhFxRI.exe.log

    Filesize

    425B

    MD5

    bb27934be8860266d478c13f2d65f45e

    SHA1

    a69a0e171864dcac9ade1b04fc0313e6b4024ccb

    SHA256

    85ad0d9909461517acf2e24ff116ca350e9b7000b4eefb23aa3647423c9745b4

    SHA512

    87dd77feac509a25b30c76c119752cc25020cca9c53276c2082aef2a8c75670ef67e1e70024a63d44ae442b64f4bc464aee6691e80c525376bb7421929cfa3bb

  • C:\Windows\SysWOW64\SubDir\svchost.exe

    Filesize

    1.6MB

    MD5

    07cabbbc11af08a2c4540c0fa2cff498

    SHA1

    78694904ffd774102ed8a7956971009aeb014356

    SHA256

    0be5a8e4d80353ec3e852df8da35a05138978ea6fb7b8cb10f244f709e170be0

    SHA512

    cc0df894db716b74f7d33e375cb66c0fbafb31f4bcc4cef937aea0038681acfb086f8c9660d9603d6ce5506bb615f01ddfb869cbc3ac5c1f444b042cc6c513d9

  • memory/1140-3-0x0000000000400000-0x0000000000594000-memory.dmp

    Filesize

    1.6MB

  • memory/1140-10-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB

  • memory/1140-18-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB

  • memory/1140-12-0x00000000058A0000-0x00000000058AA000-memory.dmp

    Filesize

    40KB

  • memory/1140-7-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB

  • memory/1140-8-0x0000000005F20000-0x00000000064C6000-memory.dmp

    Filesize

    5.6MB

  • memory/1140-9-0x0000000005790000-0x0000000005822000-memory.dmp

    Filesize

    584KB

  • memory/1140-11-0x0000000005760000-0x000000000577A000-memory.dmp

    Filesize

    104KB

  • memory/2188-19-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB

  • memory/2188-21-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB

  • memory/2188-26-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB

  • memory/2628-2-0x000000007458E000-0x000000007458F000-memory.dmp

    Filesize

    4KB

  • memory/2628-6-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB

  • memory/2628-1-0x0000000000A30000-0x0000000000BC6000-memory.dmp

    Filesize

    1.6MB

  • memory/2628-0-0x000000007458E000-0x000000007458F000-memory.dmp

    Filesize

    4KB

  • memory/2628-20-0x0000000074580000-0x0000000074D31000-memory.dmp

    Filesize

    7.7MB