File name:

contacthaven.exe

Full analysis: https://app.any.run/tasks/87870a85-b2e7-445b-b4ff-46994d81bd5d
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: March 15, 2026, 06:29:07
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
quasar
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

785B7E8A6836EA8DF1A3F3F8D1F2D21F

SHA1:

90D9112233023F4D30E8BD29BD8F6648810DAE84

SHA256:

8AD4BB9191F72CF8CB1C0AA5A96A0F51DCB4C2340A7C34A49DA61B2432EB5088

SSDEEP:

49152:veQf8gu2cK6pStmU7dPQWy4DklCg92Z7JKDX/3DgRiTnHot+YgJhs3VD2QIIjNz6:82cK6StmU7dPQkDklCg92ZN2DgcIjQP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • QUASAR has been detected (YARA)

      • contacthaven.exe (PID: 1732)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads the machine GUID from the registry

      • contacthaven.exe (PID: 1732)
    • Checks supported languages

      • contacthaven.exe (PID: 1732)
    • Reads the computer name

      • contacthaven.exe (PID: 1732)
    • Reads Environment values

      • contacthaven.exe (PID: 1732)
    • There is functionality for taking screenshot (YARA)

      • contacthaven.exe (PID: 1732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Quasar

(PID) Process(1732) contacthaven.exe
C2 (10)catcharisingstar.us.com:4782
catcharisingstar.us.com:443
catcharisingstar.us.com:8888
catcharisingstar.us.com:8848
catcharisingstar.us.com:8080
dovney.com:4782
dovney.com:443
dovney.com:8888
dovney.com:8848
dovney.com:8080
Version1.4.1
Install_Namecontacthaven.exe
Mutexcontact
Startupcontacthaven
Tagcontacthaven
LogDirLogs
SignaturedNZpoLLUVhIUfmcJK6lRbtHWhMG7UA3NW8QEXqO9217ycZ87EAjwcgOobztpYTP/3AKM9VPila3a+ZsXk4GhkQ9sEJVaRYWWZ1ZDuMwvi0OLHBgKX3x2cdfcGMVq3wQ17cM20l2OuhimGcV5PDUhwgZOoNfrfSNH3FFBxq8V1MH4NgjOzE/KENPD1X49h8jmzbUmGEbu7Y36rZGlLYRDHDnFOC/b4r4lLRYfx4jdQkzUBAvryPUvzMGyWlK1FhYzPSQVGnyFpNk5qkZawCUvU7gvY275i8UYwB5X9NhqisAN...
CertificateMIIE9DCCAtygAwIBAgIQAMyLxOGLdEdAA8ENgAq9QzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI2MDIxODA4MDUyOVoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgg/7VZFyN7dtlKk2iMKEFOIeUL/5GWZjvfRksIadzM8hqPhf42HDk6jOat07AqfE4+5fKi4c...
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:12 16:16:39+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3261952
InitializedDataSize: 71680
UninitializedDataSize: -
EntryPoint: 0x31e58e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.9.2.0
ProductVersionNumber: 0.9.2.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: HavenContact
FileDescription: Offline contact manager: local encrypted storage for phone numbers, emails, notes & relationship tags; smart search by name/mood, duplicate merger, export to vCard encrypted, no sync, no telemetry, no login – complete privacy for your personal network.
FileVersion: 0.9.2.0
InternalName: contacthaven
LegalCopyright: © HavenContact
LegalTrademarks: ContactHaven™
OriginalFileName: contacthaven
ProductName: ContactHaven
ProductVersion: 0.9.2.0
AssemblyVersion: 0.9.2.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #QUASAR contacthaven.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1732"C:\Users\admin\Desktop\contacthaven.exe" C:\Users\admin\Desktop\contacthaven.exe
explorer.exe
User:
admin
Company:
HavenContact
Integrity Level:
MEDIUM
Description:
Offline contact manager: local encrypted storage for phone numbers, emails, notes & relationship tags; smart search by name/mood, duplicate merger, export to vCard encrypted, no sync, no telemetry, n
Version:
0.9.2.0
Modules
Images
c:\users\admin\desktop\contacthaven.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Quasar
(PID) Process(1732) contacthaven.exe
C2 (10)catcharisingstar.us.com:4782
catcharisingstar.us.com:443
catcharisingstar.us.com:8888
catcharisingstar.us.com:8848
catcharisingstar.us.com:8080
dovney.com:4782
dovney.com:443
dovney.com:8888
dovney.com:8848
dovney.com:8080
Version1.4.1
Install_Namecontacthaven.exe
Mutexcontact
Startupcontacthaven
Tagcontacthaven
LogDirLogs
SignaturedNZpoLLUVhIUfmcJK6lRbtHWhMG7UA3NW8QEXqO9217ycZ87EAjwcgOobztpYTP/3AKM9VPila3a+ZsXk4GhkQ9sEJVaRYWWZ1ZDuMwvi0OLHBgKX3x2cdfcGMVq3wQ17cM20l2OuhimGcV5PDUhwgZOoNfrfSNH3FFBxq8V1MH4NgjOzE/KENPD1X49h8jmzbUmGEbu7Y36rZGlLYRDHDnFOC/b4r4lLRYfx4jdQkzUBAvryPUvzMGyWlK1FhYzPSQVGnyFpNk5qkZawCUvU7gvY275i8UYwB5X9NhqisAN...
CertificateMIIE9DCCAtygAwIBAgIQAMyLxOGLdEdAA8ENgAq9QzANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI2MDIxODA4MDUyOVoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgg/7VZFyN7dtlKk2iMKEFOIeUL/5GWZjvfRksIadzM8hqPhf42HDk6jOat07AqfE4+5fKi4c...
2148C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 678
Read events
3 678
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
25
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
7228
RUXIMICS.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
5524
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
6768
MoUsoCoreWorker.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
3292
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
US
binary
814 b
whitelisted
4104
slui.exe
POST
500
48.192.1.65:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
US
text
512 b
whitelisted
3292
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
US
binary
401 b
whitelisted
3292
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.3.crl
US
binary
400 b
whitelisted
3292
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl
US
binary
813 b
whitelisted
5524
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5524
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
Not routed
whitelisted
7228
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2.16.204.161:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
5524
svchost.exe
2.16.164.49:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
7228
RUXIMICS.exe
2.16.164.49:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6768
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
5524
svchost.exe
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
www.bing.com
  • 2.16.204.161
  • 2.16.204.141
whitelisted
google.com
  • 142.250.201.78
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.72
whitelisted
www.microsoft.com
  • 23.59.18.102
whitelisted
activation-v2.sls.microsoft.com
  • 48.192.1.65
whitelisted
self.events.data.microsoft.com
  • 20.189.173.18
whitelisted

Threats

No threats detected
No debug info