Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-06-2024 17:23
General
-
Target
Client-Built.exe
-
Size
3.1MB
-
MD5
a83d80a0db9a509be7acfa3c7ba9a066
-
SHA1
6e3c59fc948ae86e8d2d38e42b232e397f40bc48
-
SHA256
6bc733f11af6d7dce26816caa4e0bfba8f72db07c997b043619186a2e85589ed
-
SHA512
eaef06a27315caf66127a0024831444ba85c621f50b73ba31c105fc0987902214226c83fbec005de3c0603d0bfff00516a44d63a64cd4301abb3fc2967bd1c99
-
SSDEEP
49152:bvzlL26AaNeWgPhlmVqvMQ7XSKmAu4WDfR9YoGdfTrNGTHHB72eh2NT:bvpL26AaNeWgPhlmVqkQ7XSKmf4jv
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.177:4782
fd713a2a-810e-4800-b077-4b0e564f16e9
-
encryption_key
6B559FBA33993D944FD324F1D59D7F6E5BD04C2E
-
install_name
WaveKeysGenrator.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
RATS
Signatures
-
Quasar payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2088-1-0x0000000000520000-0x0000000000844000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\RATS\WaveKeysGenrator.exe family_quasar -
Executes dropped EXE 1 IoCs
Processes:
WaveKeysGenrator.exepid process 964 WaveKeysGenrator.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4496 schtasks.exe 2720 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Client-Built.exeWaveKeysGenrator.exedescription pid process Token: SeDebugPrivilege 2088 Client-Built.exe Token: SeDebugPrivilege 964 WaveKeysGenrator.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WaveKeysGenrator.exepid process 964 WaveKeysGenrator.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Client-Built.exeWaveKeysGenrator.exedescription pid process target process PID 2088 wrote to memory of 4496 2088 Client-Built.exe schtasks.exe PID 2088 wrote to memory of 4496 2088 Client-Built.exe schtasks.exe PID 2088 wrote to memory of 964 2088 Client-Built.exe WaveKeysGenrator.exe PID 2088 wrote to memory of 964 2088 Client-Built.exe WaveKeysGenrator.exe PID 964 wrote to memory of 2720 964 WaveKeysGenrator.exe schtasks.exe PID 964 wrote to memory of 2720 964 WaveKeysGenrator.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-Built.exe"C:\Users\Admin\AppData\Local\Temp\Client-Built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\RATS\WaveKeysGenrator.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\AppData\Roaming\RATS\WaveKeysGenrator.exe"C:\Users\Admin\AppData\Roaming\RATS\WaveKeysGenrator.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\RATS\WaveKeysGenrator.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\RATS\WaveKeysGenrator.exeFilesize
3.1MB
MD5a83d80a0db9a509be7acfa3c7ba9a066
SHA16e3c59fc948ae86e8d2d38e42b232e397f40bc48
SHA2566bc733f11af6d7dce26816caa4e0bfba8f72db07c997b043619186a2e85589ed
SHA512eaef06a27315caf66127a0024831444ba85c621f50b73ba31c105fc0987902214226c83fbec005de3c0603d0bfff00516a44d63a64cd4301abb3fc2967bd1c99
-
memory/964-10-0x00007FFD124B0000-0x00007FFD12F72000-memory.dmpFilesize
10.8MB
-
memory/964-11-0x00007FFD124B0000-0x00007FFD12F72000-memory.dmpFilesize
10.8MB
-
memory/964-12-0x000000001C370000-0x000000001C3C0000-memory.dmpFilesize
320KB
-
memory/964-13-0x000000001C480000-0x000000001C532000-memory.dmpFilesize
712KB
-
memory/964-14-0x00007FFD124B0000-0x00007FFD12F72000-memory.dmpFilesize
10.8MB
-
memory/2088-0-0x00007FFD124B3000-0x00007FFD124B5000-memory.dmpFilesize
8KB
-
memory/2088-1-0x0000000000520000-0x0000000000844000-memory.dmpFilesize
3.1MB
-
memory/2088-2-0x00007FFD124B0000-0x00007FFD12F72000-memory.dmpFilesize
10.8MB
-
memory/2088-9-0x00007FFD124B0000-0x00007FFD12F72000-memory.dmpFilesize
10.8MB