Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2025, 06:00

General

  • Target

    Loliسيسي.exe

  • Size

    709KB

  • MD5

    23774a66a44bffc682d79cecbbd8842d

  • SHA1

    14b902c5d292e0920846c0abdb1da3067935b9f7

  • SHA256

    93440b2cd831828f6676549ae17b3d90b954ca1c70c1ae5e5d5fe736d730db4d

  • SHA512

    52e5993a3fe7bff72c88ed5dea8fada388f401e689a8ee7e00499c0791c9f07dc11ca170e22d6ef3222cb4daafd2a127a738771275500dbf498bf00446a952c5

  • SSDEEP

    12288:sMcQNc+aZdc1bym3Uvl9CsvQn6dDL7xdpB8LU:sMcdF/cYmY9xDpB8LU

Malware Config

Extracted

Family

quasar

Version

1.7.1

Botnet

scar

C2

127.0.0.1:4444

Mutex

3073c486-4984-4930-84ec-32231685b49b

Attributes
  • encryption_key

    F36FA1155B640D230516390AB2E231DE22A10EFC

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loliسيسي.exe
    "C:\Users\Admin\AppData\Local\Temp\Loliسيسي.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5840
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1204

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-18-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-17-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-14-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-15-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-16-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-13-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-19-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-9-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-8-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/1204-7-0x0000013216740000-0x0000013216741000-memory.dmp

    Filesize

    4KB

  • memory/5840-1-0x0000000000E50000-0x0000000000F08000-memory.dmp

    Filesize

    736KB

  • memory/5840-6-0x00007FF91F2A0000-0x00007FF91FD61000-memory.dmp

    Filesize

    10.8MB

  • memory/5840-0-0x00007FF91F2A3000-0x00007FF91F2A5000-memory.dmp

    Filesize

    8KB

  • memory/5840-5-0x00007FF91F2A3000-0x00007FF91F2A5000-memory.dmp

    Filesize

    8KB

  • memory/5840-4-0x000000001D680000-0x000000001D732000-memory.dmp

    Filesize

    712KB

  • memory/5840-3-0x000000001BA50000-0x000000001BAA0000-memory.dmp

    Filesize

    320KB

  • memory/5840-2-0x00007FF91F2A0000-0x00007FF91FD61000-memory.dmp

    Filesize

    10.8MB