File name:

Client-built.exe

Full analysis: https://app.any.run/tasks/414d2f61-efba-4206-a8dc-f23cc0ef6171
Verdict: Malicious activity
Threats:

Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely.

Analysis date: March 03, 2024, 15:30:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
quasar
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

3E9C711BD750D135ED317C73974FC231

SHA1:

FF649E279A999BF3664055C7555225D0EB0E26C5

SHA256:

9CB34D20E19473DEBCDF1C16E92DA8C42B0D264FDAD683102C084F3CD26999A4

SSDEEP:

98304:t2nP6q3A6770DODdl/rADxRLDguHOeJHjM+F:sUgH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Client-built.exe (PID: 2472)
    • QUASAR has been detected (YARA)

      • Client-built.exe (PID: 2472)
  • SUSPICIOUS

    • Reads the Internet Settings

      • taskmgr.exe (PID: 3304)
    • Application launched itself

      • taskmgr.exe (PID: 3304)
  • INFO

    • Checks supported languages

      • Client-built.exe (PID: 2472)
    • Reads the computer name

      • Client-built.exe (PID: 2472)
    • Reads Environment values

      • Client-built.exe (PID: 2472)
    • Reads the machine GUID from the registry

      • Client-built.exe (PID: 2472)
    • Manual execution by a user

      • explorer.exe (PID: 3952)
      • taskmgr.exe (PID: 3304)
    • Reads security settings of Internet Explorer

      • taskmgr.exe (PID: 3304)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Quasar

(PID) Process(2472) Client-built.exe
Version1.4.1
C2 (2)tcp://0.tcp.ap.ngrok.io:16495
Sub_DirSubDir
Install_NameGoogleDB.exe
Mutex0cf68c40-b2d5-4f5b-9874-e8cdf8228b08
StartupGoogleDB
Tagvirus
LogDirLogs
SignatureJ6nD0vKwUbeRUMAc5A/TFMhYOP5MPDsZZ18F8ch3jaPkseOUdPKStiIt4Aj3OYlvOrKTZ0FkpOSTKrRaIy0qH/gaGMEN0sY5vX8WR3pr9i1lU8zTbOKaI0MKzdYeIgzPFoVRxbHyKX5mkoA5SUmJ8xW/bodxIxWODfFVHcUJpfBUELE52EaykKI1gIk/+einC3e1zpgNsez4ltd9VyKSY5dNOLFPSwZcsolPSik+CMxXyg+ofuICJpI/cil7BREeg2GOSywOkjssw6WaHP+WNBNNV1GyTe5ZxQhtv7+fCkzb...
CertificateMIIE9DCCAtygAwIBAgIQALZhw/kwCc12BVtsZ8SLKTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDExOTA4NTEwMFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp26UqqHqgQP0305A5llzoSkbqaXOsIsACBgeglDh2MBNEhqLm2hf7EVtRmJ+5ZaQ3zzryqJw...
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:12 16:16:39+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3261440
InitializedDataSize: 8192
UninitializedDataSize: -
EntryPoint: 0x31e3ce
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 120.0.6099.225
ProductVersionNumber: 120.0.6099.225
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Google
FileDescription: Google
FileVersion: 120.0.6099.225
InternalName: Google Chrome
LegalCopyright: Google
LegalTrademarks: Chrome™ browser
OriginalFileName: Google Chrome
ProductName: Chrome
ProductVersion: 120.0.6099.225
AssemblyVersion: 120.0.6099.225
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #QUASAR client-built.exe no specs explorer.exe no specs taskmgr.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
2472"C:\Users\admin\AppData\Local\Temp\Client-built.exe" C:\Users\admin\AppData\Local\Temp\Client-built.exe
explorer.exe
User:
admin
Company:
Google
Integrity Level:
MEDIUM
Description:
Google
Exit code:
0
Version:
120.0.6099.225
Modules
Images
c:\users\admin\appdata\local\temp\client-built.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Quasar
(PID) Process(2472) Client-built.exe
Version1.4.1
C2 (2)tcp://0.tcp.ap.ngrok.io:16495
Sub_DirSubDir
Install_NameGoogleDB.exe
Mutex0cf68c40-b2d5-4f5b-9874-e8cdf8228b08
StartupGoogleDB
Tagvirus
LogDirLogs
SignatureJ6nD0vKwUbeRUMAc5A/TFMhYOP5MPDsZZ18F8ch3jaPkseOUdPKStiIt4Aj3OYlvOrKTZ0FkpOSTKrRaIy0qH/gaGMEN0sY5vX8WR3pr9i1lU8zTbOKaI0MKzdYeIgzPFoVRxbHyKX5mkoA5SUmJ8xW/bodxIxWODfFVHcUJpfBUELE52EaykKI1gIk/+einC3e1zpgNsez4ltd9VyKSY5dNOLFPSwZcsolPSik+CMxXyg+ofuICJpI/cil7BREeg2GOSywOkjssw6WaHP+WNBNNV1GyTe5ZxQhtv7+fCkzb...
CertificateMIIE9DCCAtygAwIBAgIQALZhw/kwCc12BVtsZ8SLKTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MDExOTA4NTEwMFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp26UqqHqgQP0305A5llzoSkbqaXOsIsACBgeglDh2MBNEhqLm2hf7EVtRmJ+5ZaQ3zzryqJw...
3304"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3952"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3960"C:\Windows\system32\taskmgr.exe" /1C:\Windows\System32\taskmgr.exe
taskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Task Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
Total events
1 194
Read events
1 169
Write events
25
Delete events
0

Modification events

(PID) Process:(2472) Client-built.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3304) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3304) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3304) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3304) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3304) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager
Operation:writeName:Preferences
Value:
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
(PID) Process:(3304) taskmgr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager
Operation:writeName:UsrColumnSettings
Value:
1C0C0000340400000000000050000000010000001D0C0000350400000000000023000000010000001E0C000036040000000000003C000000010000001F0C000039040000000000004E00000001000000200C000037040000000000004E00000001000000
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info