Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 08:18
Behavioral task
behavioral1
Sample
89a07c9afff73c280ae14caed30f2eb2768263c0020b943d352e5424bd993d93_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
89a07c9afff73c280ae14caed30f2eb2768263c0020b943d352e5424bd993d93_NeikiAnalytics.exe
-
Size
341KB
-
MD5
12727d1a8a1cde56fa3715f6ba9ecdb0
-
SHA1
112ff64a9dfccadd7ae4618dbaf6e537b68a058f
-
SHA256
89a07c9afff73c280ae14caed30f2eb2768263c0020b943d352e5424bd993d93
-
SHA512
8502fafdad4ea9f430c6ce9f51f2686e56a13a9e23cd8cda0d420587ce11631efa076e38aa617e6ee0481331edc5e3954cc96f16b6dc1be33ad75e71cd36a7ef
-
SSDEEP
6144:ubZJrgLF70h2Jn/9A2LnugnTzTzTFNDMbMIIAZk1AlC4HCf0VVp8:G47gY/OanucQIAq94i8Vr8
Malware Config
Extracted
quasar
1.3.0.0
Office04
keke78410-60142.portmap.host:60142
QSR_MUTEX_cOv6uh77YaEpqR2GFj
-
encryption_key
8vuP81UPGlFDNPdrxBd5
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-1-0x00000000001D0000-0x000000000022C000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
89a07c9afff73c280ae14caed30f2eb2768263c0020b943d352e5424bd993d93_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 1684 89a07c9afff73c280ae14caed30f2eb2768263c0020b943d352e5424bd993d93_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1684-0-0x00000000746BE000-0x00000000746BF000-memory.dmpFilesize
4KB
-
memory/1684-1-0x00000000001D0000-0x000000000022C000-memory.dmpFilesize
368KB
-
memory/1684-2-0x00000000746B0000-0x0000000074D9E000-memory.dmpFilesize
6.9MB
-
memory/1684-3-0x00000000746BE000-0x00000000746BF000-memory.dmpFilesize
4KB
-
memory/1684-4-0x00000000746B0000-0x0000000074D9E000-memory.dmpFilesize
6.9MB