Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 10:43
Behavioral task
behavioral1
Sample
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe
Resource
win10v2004-20250314-en
General
-
Target
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe
-
Size
4.6MB
-
MD5
3ed992586de3ed67aad864fe62734937
-
SHA1
bcf4c8a3cbc671ba7fc6ac38b1581806913883dd
-
SHA256
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2
-
SHA512
42668112eacf827325c88af0c6ec59c16b918f6f9772ef84e15a5ad8f0b5b6dd9643fe6d2467216c1374725b9c6cb742017ec7cebb6fb2763189d1d697f6ac37
-
SSDEEP
98304:/gYSDiz3Clzp6QcwQhgBe8MFLgg5A4gmRGo1q0ZT:oHDcSNcwQhgBimwtH
Malware Config
Extracted
quasar
1.4.1
Office05
192.168.0.101:2025
3f648fc9-2a82-4ca1-8687-e39e14478579
-
encryption_key
F3E6B52CEF8F81BA550B56134E7C52D02C97B9AA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/5288-5-0x0000000000400000-0x000000000103E000-memory.dmp family_quasar behavioral2/memory/5288-6-0x0000000000400000-0x000000000103E000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe -
resource yara_rule behavioral2/memory/5288-5-0x0000000000400000-0x000000000103E000-memory.dmp themida behavioral2/memory/5288-6-0x0000000000400000-0x000000000103E000-memory.dmp themida -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5288 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5288 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe 5288 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5288 11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe"C:\Users\Admin\AppData\Local\Temp\11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5288