analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

34e99e2bdd0014c62e4e5cc592644c0dce0a60f2bf72396fac563633df1013d1.doc

Full analysis: https://app.any.run/tasks/95ebb753-a38f-4f7a-83da-66c4cde88f3e
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: May 24, 2019, 02:47:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
generated-doc
rat
quasar
evasion
trojan
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

484F95FB71E49D20181EB82EDDD1315A

SHA1:

7715F9E4C98FE4FEB9B164021E1ED8A2E1AB5AB4

SHA256:

34E99E2BDD0014C62E4E5CC592644C0DCE0A60F2BF72396FAC563633DF1013D1

SSDEEP:

3072:0RVUblsdYyo/rviqm/UJCr21NKr5AjnwPg9yxWgzNPOIhEh7LCgZG9L6u0NwXOpX:GaiS/eqmMFHKrCwxLZ/iugZAL7Db4B

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Client-built.exe (PID: 3168)
      • Client.exe (PID: 1512)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 3412)
    • Drops/Copies Quasar RAT executable

      • WINWORD.EXE (PID: 3412)
      • Client-built.exe (PID: 3168)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 3412)
    • Changes the autorun value in the registry

      • Client-built.exe (PID: 3168)
      • Client.exe (PID: 1512)
    • QUASAR was detected

      • Client-built.exe (PID: 3168)
      • Client.exe (PID: 1512)
  • SUSPICIOUS

    • Creates files in the user directory

      • Client-built.exe (PID: 3168)
      • Client.exe (PID: 1512)
    • Executable content was dropped or overwritten

      • Client-built.exe (PID: 3168)
    • Checks for external IP

      • Client-built.exe (PID: 3168)
      • Client.exe (PID: 1512)
    • Starts itself from another location

      • Client-built.exe (PID: 3168)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3412)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docx | Word Microsoft Office Open XML Format document (52.2)
.zip | Open Packaging Conventions container (38.8)
.zip | ZIP compressed archive (8.8)

EXIF

XML

AppVersion: 16
HyperlinksChanged: No
SharedDoc: No
CharactersWithSpaces: 20
LinksUpToDate: No
Company: -
ScaleCrop: No
Paragraphs: 1
Lines: 1
DocSecurity: None
Application: Microsoft Office Word
Characters: 18
Words: 3
Pages: 1
TotalEditTime: -
Template: Normal.dotm
ModifyDate: 2019:05:23 08:21:00Z
CreateDate: 2019:05:23 08:21:00Z
RevisionNumber: 1
LastModifiedBy: metoo
Keywords: -

XMP

Description: -
Creator: metoo
Subject: -
Title: -

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 1460
ZipCompressedSize: 373
ZipCRC: 0x24886c04
ZipModifyDate: 1980:01:01 00:00:00
ZipCompression: Deflated
ZipBitFlag: 0x0006
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winword.exe #QUASAR client-built.exe #QUASAR client.exe

Process information

PID
CMD
Path
Indicators
Parent process
3412"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\34e99e2bdd0014c62e4e5cc592644c0dce0a60f2bf72396fac563633df1013d1.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3168"C:\Users\admin\AppData\Local\Temp\Client-built.exe" C:\Users\admin\AppData\Local\Temp\Client-built.exe
WINWORD.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.3.0.0
1512"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"C:\Users\admin\AppData\Roaming\SubDir\Client.exe
Client-built.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.3.0.0
Total events
1 602
Read events
889
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
1
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
3412WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRE9E.tmp.cvr
MD5:
SHA256:
1512Client.exeC:\Users\admin\AppData\Roaming\Logs\05-24-2019binary
MD5:2EB1524E25C022FDC5BF6A779ADA1DBF
SHA256:F2058E3519F7EECB3A28A4F652BDF885DEBAD422415BAF82DCE38D1D3C82441D
3412WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\211548F8.emfemf
MD5:78AB8D61449D41FBD8E221D54160D243
SHA256:20C2A2F90C0F2AA7854616E1908A821351FEDBF85FC8AF776E887E8E43836B68
3412WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Client-built.exeexecutable
MD5:9EC9A84E0F6543260999CE1B90447DF7
SHA256:E7D56CCF4AADB0AF95D94B8B2E1849B406E6C48CE6298D4AFB290E39D32B39C0
3412WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$e99e2bdd0014c62e4e5cc592644c0dce0a60f2bf72396fac563633df1013d1.docpgc
MD5:9E1C083C98CAC798F4753A4422B7FFE6
SHA256:0820C4AD9E6B9DB4D74EF0F8B13C23140D814A27DC255D4BA18B96C934DA7130
3412WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:5CD61CFBE1DD5472DB033FCE1F9DDE3D
SHA256:B7CDA6F44CC798BB0D8A722811A71E2399490AFEA463B50F38021D69C856CED9
3168Client-built.exeC:\Users\admin\AppData\Roaming\SubDir\Client.exeexecutable
MD5:9EC9A84E0F6543260999CE1B90447DF7
SHA256:E7D56CCF4AADB0AF95D94B8B2E1849B406E6C48CE6298D4AFB290E39D32B39C0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1512
Client.exe
GET
200
185.194.141.58:80
http://ip-api.com/json/
DE
text
269 b
shared
3168
Client-built.exe
GET
200
185.194.141.58:80
http://ip-api.com/json/
DE
text
269 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1512
Client.exe
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
3168
Client-built.exe
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
1512
Client.exe
64.251.27.103:4782
Infolink Global Corporation
US
malicious

DNS requests

Domain
IP
Reputation
ip-api.com
  • 185.194.141.58
shared

Threats

PID
Process
Class
Message
3168
Client-built.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3168
Client-built.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar 1.3 RAT IP Lookup ip-api.com (HTTP headeer)
1512
Client.exe
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
1512
Client.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar 1.3 RAT IP Lookup ip-api.com (HTTP headeer)
1512
Client.exe
A Network Trojan was detected
MALWARE [PTsecurity] Quasar RAT
2 ETPRO signatures available at the full report
No debug info