Analysis

  • max time kernel
    101s
  • max time network
    114s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/04/2025, 07:47

General

  • Target

    Client-built.exe

  • Size

    1.5MB

  • MD5

    efdf48328fd93af977682db2ac7b56ce

  • SHA1

    006abc06af3cdc20dd52588beb5ce4f13273f2db

  • SHA256

    dd1ff957df241c8301de5be805cbe9c484a9d3768e657afffc83a0697f881674

  • SHA512

    30f723977dd6006954f6fc19c23abf421c11a00845ba9dbbd9a465ce6c7a023f96bc641023a1833605cc0306d1e4a7371cee7e2f31bb755d02c25f548949f8d3

  • SSDEEP

    24576:uU1R7bTS2eWBRwRR16zhHIPbcNK0KKm77yviUSQaZaOwI55l2S62r9exnXWiA1Qx:uqRR7wR2EgKKm77LrwCB6T+1Q

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • encryption_key

    1FB7485171FF20CDA99F01C1B832D8813FC1E606

  • reconnect_delay

    3000

  • startup_key

    �&)M-Im�� c�hp����C��.��

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "Pulsar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2712
    • C:\Windows\system32\SubDir\Client.exe
      "C:\Windows\system32\SubDir\Client.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "Pulsar Client Startup" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:5112
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /delete /tn "Pulsar Client Startup" /f
        3⤵
          PID:5456
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Y98xZsl7JCTF.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\system32\chcp.com
            chcp 65001
            4⤵
              PID:5196
            • C:\Windows\system32\timeout.exe
              timeout /T 5 /NOBREAK
              4⤵
              • Delays execution with timeout.exe
              PID:1040

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Y98xZsl7JCTF.bat

        Filesize

        201B

        MD5

        3de467fea8ce57950742659bf12c44ff

        SHA1

        d0504505cb23356ad788c78850f8f4921d5b6b16

        SHA256

        822f7293fc62f223b7edf33e8f1ab5f230d220dd18dfadc3099891ecb6d8dfd2

        SHA512

        07460fd86847dd1c623bfac54e94dd769147d4d014ff80f7144e66a051aeb93460850a5c3fe3bd16c25fc9c985af0a9ec4ff675e85ffed5f2ddf12c5675b824c

      • C:\Windows\System32\SubDir\Client.exe

        Filesize

        1.5MB

        MD5

        efdf48328fd93af977682db2ac7b56ce

        SHA1

        006abc06af3cdc20dd52588beb5ce4f13273f2db

        SHA256

        dd1ff957df241c8301de5be805cbe9c484a9d3768e657afffc83a0697f881674

        SHA512

        30f723977dd6006954f6fc19c23abf421c11a00845ba9dbbd9a465ce6c7a023f96bc641023a1833605cc0306d1e4a7371cee7e2f31bb755d02c25f548949f8d3

      • memory/1268-0-0x00007FFD03C53000-0x00007FFD03C55000-memory.dmp

        Filesize

        8KB

      • memory/1268-1-0x000001A0085F0000-0x000001A008782000-memory.dmp

        Filesize

        1.6MB

      • memory/1268-2-0x000001A008BC0000-0x000001A008BDA000-memory.dmp

        Filesize

        104KB

      • memory/1268-3-0x00007FFD03C50000-0x00007FFD04712000-memory.dmp

        Filesize

        10.8MB

      • memory/1268-9-0x00007FFD03C50000-0x00007FFD04712000-memory.dmp

        Filesize

        10.8MB

      • memory/4940-15-0x00000237AE680000-0x00000237AE6CE000-memory.dmp

        Filesize

        312KB

      • memory/4940-18-0x00000237C73F0000-0x00000237C741A000-memory.dmp

        Filesize

        168KB

      • memory/4940-13-0x00000237C70D0000-0x00000237C7120000-memory.dmp

        Filesize

        320KB

      • memory/4940-11-0x00007FFD03C50000-0x00007FFD04712000-memory.dmp

        Filesize

        10.8MB

      • memory/4940-14-0x00000237C7460000-0x00000237C7512000-memory.dmp

        Filesize

        712KB

      • memory/4940-17-0x00000237C73A0000-0x00000237C73EA000-memory.dmp

        Filesize

        296KB

      • memory/4940-16-0x00000237C7120000-0x00000237C716C000-memory.dmp

        Filesize

        304KB

      • memory/4940-12-0x00000237AE640000-0x00000237AE67A000-memory.dmp

        Filesize

        232KB

      • memory/4940-21-0x00000237C7A70000-0x00000237C7A82000-memory.dmp

        Filesize

        72KB

      • memory/4940-22-0x00000237C7AD0000-0x00000237C7B0C000-memory.dmp

        Filesize

        240KB

      • memory/4940-23-0x00007FFD03C50000-0x00007FFD04712000-memory.dmp

        Filesize

        10.8MB

      • memory/4940-24-0x00007FFD03C50000-0x00007FFD04712000-memory.dmp

        Filesize

        10.8MB

      • memory/4940-10-0x00007FFD03C50000-0x00007FFD04712000-memory.dmp

        Filesize

        10.8MB

      • memory/4940-30-0x00007FFD03C50000-0x00007FFD04712000-memory.dmp

        Filesize

        10.8MB