Analysis
-
max time kernel
133s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2025, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-20_ac8e7f19e4d3e6ad8bdabd57dc79063e_black-basta_cobalt-strike_satacom.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-20_ac8e7f19e4d3e6ad8bdabd57dc79063e_black-basta_cobalt-strike_satacom.exe
-
Size
1.5MB
-
MD5
ac8e7f19e4d3e6ad8bdabd57dc79063e
-
SHA1
2dcf6ea2e23dd4f1b774693cde1555b02abd28c9
-
SHA256
77a7cd3a32b8f2034e427b8d7ca740a6c4f9e0bc79d4b7eddd7922668ef9f24a
-
SHA512
ffc28fa7cca91a15263e86d973dbdfc19dd1030c46b822d9b01ab4582b6d787dc3c18a10dbd9824d69e25403c1f61456fdf31030fb853a49aff190ac7e47016a
-
SSDEEP
24576:xEeqQq3KnmI5yjNeGNcZQg0pWdKZGzgDv7hEiOTVGT6QZhkVyYtW:xEuq6mAyjMGNcZOWdsz7exq/kVRtW
Malware Config
Extracted
quasar
1.4.1
Java
192.168.1.33:4782
dbd83e28-626e-4246-bc34-1a191d13a0d2
-
encryption_key
F99A16169D9E428A1B70483052E7EC2C3781496E
-
install_name
javaupdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x00080000000242b0-6.dat family_quasar behavioral1/memory/1904-15-0x0000000000530000-0x0000000000854000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 2025-04-20_ac8e7f19e4d3e6ad8bdabd57dc79063e_black-basta_cobalt-strike_satacom.exe -
Executes dropped EXE 2 IoCs
pid Process 1904 java.exe 4744 javaupdater.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\SubDir\javaupdater.exe java.exe File opened for modification C:\Windows\system32\SubDir\javaupdater.exe java.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1100 schtasks.exe 4816 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1904 java.exe Token: SeDebugPrivilege 4744 javaupdater.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4744 javaupdater.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4744 javaupdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4744 javaupdater.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 6116 wrote to memory of 1904 6116 2025-04-20_ac8e7f19e4d3e6ad8bdabd57dc79063e_black-basta_cobalt-strike_satacom.exe 94 PID 6116 wrote to memory of 1904 6116 2025-04-20_ac8e7f19e4d3e6ad8bdabd57dc79063e_black-basta_cobalt-strike_satacom.exe 94 PID 1904 wrote to memory of 4816 1904 java.exe 96 PID 1904 wrote to memory of 4816 1904 java.exe 96 PID 1904 wrote to memory of 4744 1904 java.exe 98 PID 1904 wrote to memory of 4744 1904 java.exe 98 PID 4744 wrote to memory of 1100 4744 javaupdater.exe 101 PID 4744 wrote to memory of 1100 4744 javaupdater.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-20_ac8e7f19e4d3e6ad8bdabd57dc79063e_black-basta_cobalt-strike_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-20_ac8e7f19e4d3e6ad8bdabd57dc79063e_black-basta_cobalt-strike_satacom.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\java.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\java.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java" /sc ONLOGON /tr "C:\Windows\system32\SubDir\javaupdater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4816
-
-
C:\Windows\system32\SubDir\javaupdater.exe"C:\Windows\system32\SubDir\javaupdater.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java" /sc ONLOGON /tr "C:\Windows\system32\SubDir\javaupdater.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1100
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD58bb0dc5d9a0aa31d1220b8a5c841d63f
SHA19db89465ff40e3d2a527fd32415edec54375a579
SHA2566db909315993c048d5236ff97c4c3ff648de6ea67850b3c33cbbc33e779dd5bf
SHA512cd9c638ee17a05c71161967a0ace7381d84f4a0142d9324110f6c785a0ee150a23760f7bd64f7db3203823fd4a8a6430f63260585ed148fde802c2fb57a4dcc4