Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2025, 06:00
General
-
Target
Loliسيسي.exe
-
Size
709KB
-
MD5
23774a66a44bffc682d79cecbbd8842d
-
SHA1
14b902c5d292e0920846c0abdb1da3067935b9f7
-
SHA256
93440b2cd831828f6676549ae17b3d90b954ca1c70c1ae5e5d5fe736d730db4d
-
SHA512
52e5993a3fe7bff72c88ed5dea8fada388f401e689a8ee7e00499c0791c9f07dc11ca170e22d6ef3222cb4daafd2a127a738771275500dbf498bf00446a952c5
-
SSDEEP
12288:sMcQNc+aZdc1bym3Uvl9CsvQn6dDL7xdpB8LU:sMcdF/cYmY9xDpB8LU
Malware Config
Extracted
Family
quasar
Version
1.7.1
Botnet
scar
C2
127.0.0.1:4444
Mutex
3073c486-4984-4930-84ec-32231685b49b
Attributes
-
encryption_key
F36FA1155B640D230516390AB2E231DE22A10EFC
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/5840-1-0x0000000000E50000-0x0000000000F08000-memory.dmp family_quasar -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 5840 Loliسيسي.exe Token: SeDebugPrivilege 1204 taskmgr.exe Token: SeSystemProfilePrivilege 1204 taskmgr.exe Token: SeCreateGlobalPrivilege 1204 taskmgr.exe Token: 33 1204 taskmgr.exe Token: SeIncBasePriorityPrivilege 1204 taskmgr.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe 1204 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loliسيسي.exe"C:\Users\Admin\AppData\Local\Temp\Loliسيسي.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5840
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1204