Analysis

  • max time kernel
    50s
  • max time network
    461s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-06-2024 14:19

General

  • Target

    Quasar v1.4.1/Quasar.exe

  • Size

    1.2MB

  • MD5

    12ebf922aa80d13f8887e4c8c5e7be83

  • SHA1

    7f87a80513e13efd45175e8f2511c2cd17ff51e8

  • SHA256

    43315abb9c8be9a39782bd8694a7ea9f16a867500dc804454d04b8bf2c15c51e

  • SHA512

    fda5071e15cf077d202b08db741bbfb3dbd815acc41deec7b7d44e055cac408e2f2de7233f8f9c5c618afd00ffc2fc4c6e8352cbdf18f9aab55d980dcb58a275

  • SSDEEP

    12288:IwPs012cBBBYiL9l/bFfpBBBBBBBBBBBBcA:jBBBYiLvzFfpBBBBBBBBBBBBcA

Score
10/10

Malware Config

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe
    "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\Quasar.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe" /select, "C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12"
      2⤵
        PID:632
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:876
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4212

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
        Filesize

        14KB

        MD5

        8b0db1922b300badec414af13c231630

        SHA1

        5a175ad6744083ae427c66f3ff238c8a23b52a7c

        SHA256

        844ae96b032247958fe7a28d39d5553ef6cee1342a6bee56f3f9291eb2be22aa

        SHA512

        e1055ce1d1881ef9a7dc2a4ae4835510fa8c3ec3822f8151041f894726a2d6afdc79a91bfed05382a5628537502a08d433ad17918e277703f13247231e923952

      • C:\Users\Admin\AppData\Local\Temp\Quasar v1.4.1\quasar.p12
        Filesize

        4KB

        MD5

        7b557a796c20348d91dd5ea246b77054

        SHA1

        6474adc1bf55cbd17daf12c7a04c785682268cbf

        SHA256

        c3d7a215a488aad143e8b275ab914a2a7ac1f9a1f4480b2e26411daf2fdb049c

        SHA512

        4ae3dc132a9c6222da0f831b3246cc98501288ca60df75bd8e645d7b9118c945f242ecdd8af17a30fdc4c2a53ed9765a8487b180fc667397627d1ea515fc7a8f

      • memory/1624-8-0x00007FFB728F0000-0x00007FFB733B2000-memory.dmp
        Filesize

        10.8MB

      • memory/1624-9-0x00007FFB728F0000-0x00007FFB733B2000-memory.dmp
        Filesize

        10.8MB

      • memory/1624-4-0x00007FFB728F0000-0x00007FFB733B2000-memory.dmp
        Filesize

        10.8MB

      • memory/1624-5-0x00007FFB728F0000-0x00007FFB733B2000-memory.dmp
        Filesize

        10.8MB

      • memory/1624-6-0x00007FFB728F0000-0x00007FFB733B2000-memory.dmp
        Filesize

        10.8MB

      • memory/1624-7-0x000001AABF840000-0x000001AABFB6E000-memory.dmp
        Filesize

        3.2MB

      • memory/1624-1-0x000001AAA2800000-0x000001AAA2938000-memory.dmp
        Filesize

        1.2MB

      • memory/1624-3-0x00007FFB728F0000-0x00007FFB733B2000-memory.dmp
        Filesize

        10.8MB

      • memory/1624-10-0x00007FFB728F0000-0x00007FFB733B2000-memory.dmp
        Filesize

        10.8MB

      • memory/1624-2-0x000001AAA2DC0000-0x000001AAA2DD6000-memory.dmp
        Filesize

        88KB

      • memory/1624-31-0x000001AABF4A0000-0x000001AABF4F0000-memory.dmp
        Filesize

        320KB

      • memory/1624-33-0x000001AAC10A0000-0x000001AAC10EC000-memory.dmp
        Filesize

        304KB

      • memory/1624-32-0x000001AAC1160000-0x000001AAC1212000-memory.dmp
        Filesize

        712KB

      • memory/1624-30-0x000001AABF430000-0x000001AABF448000-memory.dmp
        Filesize

        96KB

      • memory/1624-0-0x00007FFB728F3000-0x00007FFB728F5000-memory.dmp
        Filesize

        8KB