File name:

Electron.exe

Full analysis: https://app.any.run/tasks/fac4107a-7d1d-4dd1-aaa0-b1c81328f15b
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: December 02, 2023, 18:08:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
asyncrat
remote
quasar
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

5DD7500F21ADD8F9BC322529A35CB55F

SHA1:

B12EEC8FDF6224F65E27FB9D9B06DC4375E1B37B

SHA256:

48D2D3E579BBCDDDA54AA5BD48197B179CA7B75018D05CE12FF3CF9E7B78E40E

SSDEEP:

98304:x2uiieRyd72QsLDil92m3GJEDgwaRRdX6j77E:amglQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • Electron.exe (PID: 2644)
    • QUASAR has been detected (SURICATA)

      • Electron.exe (PID: 2644)
    • ASYNCRAT has been detected (SURICATA)

      • Electron.exe (PID: 2644)
    • QUASAR has been detected (YARA)

      • Electron.exe (PID: 2644)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • Electron.exe (PID: 2644)
    • Reads the Internet Settings

      • Electron.exe (PID: 2644)
    • Connects to unusual port

      • Electron.exe (PID: 2644)
    • Starts CMD.EXE for commands execution

      • Electron.exe (PID: 2644)
    • Starts application with an unusual extension

      • cmd.exe (PID: 1152)
    • Executing commands from a ".bat" file

      • Electron.exe (PID: 2644)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 1152)
  • INFO

    • Checks supported languages

      • Electron.exe (PID: 2644)
      • wmpnscfg.exe (PID: 2956)
      • chcp.com (PID: 2108)
    • Reads Environment values

      • Electron.exe (PID: 2644)
    • Reads the computer name

      • Electron.exe (PID: 2644)
      • wmpnscfg.exe (PID: 2956)
    • Manual execution by a user

      • notepad.exe (PID: 2688)
      • wmpnscfg.exe (PID: 2956)
      • taskmgr.exe (PID: 3856)
    • Reads the machine GUID from the registry

      • Electron.exe (PID: 2644)
    • Create files in a temporary directory

      • Electron.exe (PID: 2644)
    • Creates files or folders in the user directory

      • Electron.exe (PID: 2644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Quasar

(PID) Process(2644) Electron.exe
Version1.4.1
C2 (2)limehag920-33288.portmap.host:33288
Sub_DirSubDir
Install_NameClient.exe
Mutex9818b060-d6e3-4e48-b21e-c9ef7bc65511
StartupQuasar Client Startup
TagOffice04
LogDirLogs
SignaturePWqcW0flofkLccXQ6vZv+kg9jDpZE29KOwoNneFVK1YYLQYAXd3xQpk88PUtDx8eSrGPCyzMM6btyTVze5oWF4wR1IawjPKzUzEVpNtkAe1nbTy/1aGdULlh5E1MmfJ+3eYuO9Cyd4Q23HCf8V0rp565CYNB5mfcgVUVHm/4Wp7jK99QZEh4QkfACNqft3rj1J6XEu8TfKbPLmtrfbDhe8QubeZRn01qfKd7xIosQ2WDSjrth1aoyAcUxXI7DU3S6opREIcDBgxpCbowXxxUd9D08q3TA3tV0thbVzuPJaTE...
CertificateMIIE9DCCAtygAwIBAgIQAOVqm04ujwJLAT5iBKRSKTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIzMTEzMDE3MjE0MFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlM1LFSxEqvMbNxg6Hq8o8HD5WgZ5409hJBw63LT+shUb6RVIMB8r4E/avNXdMEGE2sprCiHI...
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:12 17:16:39+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3261952
InitializedDataSize: 72704
UninitializedDataSize: -
EntryPoint: 0x31e41e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.4.1.0
ProductVersionNumber: 1.4.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Quasar Client
FileVersion: 1.4.1
InternalName: Client.exe
LegalCopyright: Copyright © MaxXor 2023
LegalTrademarks: -
OriginalFileName: Client.exe
ProductName: Quasar
ProductVersion: 1.4.1
AssemblyVersion: 1.4.1.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #QUASAR electron.exe notepad.exe no specs wmpnscfg.exe no specs cmd.exe no specs chcp.com no specs ping.exe no specs taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1152C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\e6UFakJsLydW.bat" "C:\Windows\System32\cmd.exeElectron.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2108chcp 65001C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2300ping -n 10 localhost C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2644"C:\Users\admin\AppData\Local\Temp\Electron.exe" C:\Users\admin\AppData\Local\Temp\Electron.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Quasar Client
Exit code:
0
Version:
1.4.1
Modules
Images
c:\users\admin\appdata\local\temp\electron.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Quasar
(PID) Process(2644) Electron.exe
Version1.4.1
C2 (2)limehag920-33288.portmap.host:33288
Sub_DirSubDir
Install_NameClient.exe
Mutex9818b060-d6e3-4e48-b21e-c9ef7bc65511
StartupQuasar Client Startup
TagOffice04
LogDirLogs
SignaturePWqcW0flofkLccXQ6vZv+kg9jDpZE29KOwoNneFVK1YYLQYAXd3xQpk88PUtDx8eSrGPCyzMM6btyTVze5oWF4wR1IawjPKzUzEVpNtkAe1nbTy/1aGdULlh5E1MmfJ+3eYuO9Cyd4Q23HCf8V0rp565CYNB5mfcgVUVHm/4Wp7jK99QZEh4QkfACNqft3rj1J6XEu8TfKbPLmtrfbDhe8QubeZRn01qfKd7xIosQ2WDSjrth1aoyAcUxXI7DU3S6opREIcDBgxpCbowXxxUd9D08q3TA3tV0thbVzuPJaTE...
CertificateMIIE9DCCAtygAwIBAgIQAOVqm04ujwJLAT5iBKRSKTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIzMTEzMDE3MjE0MFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlM1LFSxEqvMbNxg6Hq8o8HD5WgZ5409hJBw63LT+shUb6RVIMB8r4E/avNXdMEGE2sprCiHI...
2688"C:\Windows\system32\notepad.exe" C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2956"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3856"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
5 392
Read events
5 372
Write events
20
Delete events
0

Modification events

(PID) Process:(2644) Electron.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2644) Electron.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2644) Electron.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2644) Electron.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2644) Electron.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
5
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2644Electron.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:53B49CC3C01523AF64BF4476F3E64994
SHA256:BFA3C653B9C3186BA5174E642748BB44C3C5156D28A1365B946055A4FE6194B9
2644Electron.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
2644Electron.exeC:\Users\admin\AppData\Local\Temp\Cab7BDB.tmpcompressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
2644Electron.exeC:\Users\admin\AppData\Local\Temp\Tar7BDC.tmpbinary
MD5:9C0C641C06238516F27941AA1166D427
SHA256:4276AF3669A141A59388BC56A87F6614D9A9BDDDF560636C264219A7EB11256F
2644Electron.exeC:\Users\admin\AppData\Local\Temp\e6UFakJsLydW.battext
MD5:AC1C6443B7A4AB9F873A41247BD7796C
SHA256:1F5C07B650D0E8E73184283F65B3DE979683730E19C87EEDE60395B8D37A4A00
2644Electron.exeC:\Users\admin\AppData\Roaming\Logs\2023-12-02binary
MD5:1AA902590345C37FF79DD085A1F67C7A
SHA256:F7AC22972DF14440EA19E110A889C20BF21C4B78607471C6D42365D888C15016
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
7
DNS requests
3
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2644
Electron.exe
GET
200
184.24.77.209:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?fa3c82c36e7edb38
unknown
compressed
65.2 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
2644
Electron.exe
193.161.193.99:33288
limehag920-33288.portmap.host
OOO Bitree Networks
RU
malicious
2644
Electron.exe
184.24.77.209:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
2644
Electron.exe
195.201.57.90:443
ipwho.is
Hetzner Online GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
limehag920-33288.portmap.host
  • 193.161.193.99
malicious
ctldl.windowsupdate.com
  • 184.24.77.209
  • 184.24.77.208
  • 184.24.77.180
  • 184.24.77.174
  • 184.24.77.186
  • 184.24.77.207
  • 184.24.77.206
  • 184.24.77.205
  • 184.24.77.179
whitelisted
ipwho.is
  • 195.201.57.90
malicious

Threats

PID
Process
Class
Message
1080
svchost.exe
Potential Corporate Privacy Violation
ET POLICY DNS Query to a Reverse Proxy Service Observed
1080
svchost.exe
Misc activity
ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host)
2644
Electron.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
2644
Electron.exe
Domain Observed Used for C2 Detected
ET MALWARE Generic AsyncRAT Style SSL Cert
1080
svchost.exe
Potentially Bad Traffic
ET INFO External IP Lookup Domain in DNS Lookup (ipwho .is)
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] QuasarRAT Successful Connection (GCM_SHA384)
No debug info