File name: | host.rar |
Full analysis: | https://app.any.run/tasks/fe94ea0b-746b-427e-b33d-2f8111107f60 |
Verdict: | Malicious activity |
Threats: | Quasar is a very popular RAT in the world thanks to its code being available in open-source. This malware can be used to control the victim’s computer remotely. |
Analysis date: | October 30, 2023, 21:19:41 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-rar |
File info: | RAR archive data, v5 |
MD5: | 546DB3FCD7E65363457A2FB3D10AC617 |
SHA1: | 7B086F07A02EED0C5706B0E9B6824505A0414120 |
SHA256: | BE89472C81E89FF3FE48FB7AD18489E2F6DB45ABFE118F6EB4EEB6F01977FCDD |
SSDEEP: | 6144:cfq/cwngD/DQYi7aFTVXRBXwAjMJjJOZIGoQ3qz8:HcrLfkw77gJ9OZIGoQ3qQ |
.rar | | | RAR compressed archive (v5.0) (61.5) |
---|---|---|
.rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1824 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\host.rar" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.91.0 Modules
| |||||||||||||||
2952 | "C:\Users\admin\AppData\Roaming\System32\host.exe" | C:\Users\admin\AppData\Roaming\System32\host.exe | host.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.3.0.0 Modules
Quasar(PID) Process(2952) host.exe Version1.3.0.0 C2 (2)youtubevideos.duckdns.org:60 Sub_DirSystem32 Install_Namehost.exe MutexQSR_MUTEX_UW2Q1R9Nhq2Wep6ciM Startuphost Tagcrypto new 2 LogDirLogs Signature Certificate | |||||||||||||||
3780 | "C:\Users\admin\Desktop\host.exe" | C:\Users\admin\Desktop\host.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.3.0.0 Modules
|
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E |
Operation: | write | Name: | LanguageList |
Value: en-US | |||
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | name |
Value: 120 | |||
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | size |
Value: 80 | |||
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | type |
Value: 120 | |||
(PID) Process: | (1824) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
Operation: | write | Name: | mtime |
Value: 100 | |||
(PID) Process: | (2952) host.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
Operation: | write | Name: | host |
Value: "C:\Users\admin\Desktop\host.exe" |
PID | Process | Filename | Type | |
---|---|---|---|---|
1824 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRa1824.27848\host.exe | executable | |
MD5:E0DC6722A9BC7AF2D3FCF19E894F5043 | SHA256:63C22FF05A3D78DD08DEDA98041B693BF13815DF41DA51CAA2DCA1BB991DDDB6 | |||
3780 | host.exe | C:\Users\admin\AppData\Roaming\System32\host.exe | executable | |
MD5:E0DC6722A9BC7AF2D3FCF19E894F5043 | SHA256:63C22FF05A3D78DD08DEDA98041B693BF13815DF41DA51CAA2DCA1BB991DDDB6 | |||
2952 | host.exe | C:\Users\admin\AppData\Roaming\Logs\10-30-2023 | binary | |
MD5:CF2A793A33860FA0CC3C1F8CED04F7BD | SHA256:95C1A9CCB8F377A1136691475F2AB1BA703F96388730361A4CAC5F8E4A522E38 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2952 | host.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | binary | 297 b | — |
3780 | host.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | binary | 297 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | unknown |
2656 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
3780 | host.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | unknown |
2952 | host.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | unknown |
2952 | host.exe | 197.166.203.42:60 | youtubevideos.duckdns.org | LINKdotNET | EG | unknown |
4 | System | 192.168.100.255:138 | — | — | — | unknown |
Domain | IP | Reputation |
---|---|---|
ip-api.com |
| unknown |
youtubevideos.duckdns.org |
| unknown |
dns.msftncsi.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | ET MALWARE Common RAT Connectivity Check Observed |
— | — | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
— | — | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
— | — | A Network Trojan was detected | ET MALWARE Common RAT Connectivity Check Observed |
— | — | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
— | — | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
— | — | Potentially Bad Traffic | ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain |
— | — | Misc activity | ET INFO DYNAMIC_DNS Query to *.duckdns. Domain |
— | — | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] QuasarRAT Successful Connection (TCP) |