Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 13:35
Behavioral task
behavioral1
Sample
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe
-
Size
3.1MB
-
MD5
d181dce39738d9e0dc2bb72f6eed42c0
-
SHA1
1a29deb5438dcd846481caa1ff63e20fbab3a105
-
SHA256
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f
-
SHA512
3560422321ad7790f24194bd70a6eec3f51a167aa579706364ff904bea3c848baafc58789833130a81b3c3fcaf3d286423dc75a74ac2dccb657407f644a44cfe
-
SSDEEP
49152:fvilL26AaNeWgPhlmVqvMQ7XSKH9RJ6CbR3LoGdsTHHB72eh2NT:fvaL26AaNeWgPhlmVqkQ7XSKH9RJ68
Malware Config
Extracted
quasar
1.4.1
Office04
badgeroblxo.ddns.net:1234
192.168.0.107:1234
48a9e5c0-f0c1-4182-bc93-e4c42d5e6d72
-
encryption_key
524892BD8A433CE8E6A342E36737F573CEF5D252
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2480-1-0x00000000000C0000-0x00000000003E4000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2480 9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2480-0-0x000007FEF57F3000-0x000007FEF57F4000-memory.dmpFilesize
4KB
-
memory/2480-1-0x00000000000C0000-0x00000000003E4000-memory.dmpFilesize
3.1MB
-
memory/2480-2-0x000007FEF57F0000-0x000007FEF61DC000-memory.dmpFilesize
9.9MB
-
memory/2480-3-0x000007FEF57F3000-0x000007FEF57F4000-memory.dmpFilesize
4KB
-
memory/2480-4-0x000007FEF57F0000-0x000007FEF61DC000-memory.dmpFilesize
9.9MB