Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 13:35
Behavioral task
behavioral1
Sample
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe
-
Size
3.1MB
-
MD5
d181dce39738d9e0dc2bb72f6eed42c0
-
SHA1
1a29deb5438dcd846481caa1ff63e20fbab3a105
-
SHA256
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f
-
SHA512
3560422321ad7790f24194bd70a6eec3f51a167aa579706364ff904bea3c848baafc58789833130a81b3c3fcaf3d286423dc75a74ac2dccb657407f644a44cfe
-
SSDEEP
49152:fvilL26AaNeWgPhlmVqvMQ7XSKH9RJ6CbR3LoGdsTHHB72eh2NT:fvaL26AaNeWgPhlmVqkQ7XSKH9RJ68
Malware Config
Extracted
quasar
1.4.1
Office04
badgeroblxo.ddns.net:1234
192.168.0.107:1234
48a9e5c0-f0c1-4182-bc93-e4c42d5e6d72
-
encryption_key
524892BD8A433CE8E6A342E36737F573CEF5D252
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4688-1-0x0000000000590000-0x00000000008B4000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 4688 9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4688-0-0x00007FFD9B843000-0x00007FFD9B845000-memory.dmpFilesize
8KB
-
memory/4688-1-0x0000000000590000-0x00000000008B4000-memory.dmpFilesize
3.1MB
-
memory/4688-2-0x00007FFD9B840000-0x00007FFD9C301000-memory.dmpFilesize
10.8MB
-
memory/4688-3-0x000000001D0F0000-0x000000001D140000-memory.dmpFilesize
320KB
-
memory/4688-4-0x000000001D200000-0x000000001D2B2000-memory.dmpFilesize
712KB
-
memory/4688-5-0x00007FFD9B843000-0x00007FFD9B845000-memory.dmpFilesize
8KB
-
memory/4688-6-0x00007FFD9B840000-0x00007FFD9C301000-memory.dmpFilesize
10.8MB