Analysis

  • max time kernel
    4s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2023 04:54

General

  • Target

    NEAS.acf516c320186a58f2890918135f4f20.exe

  • Size

    2.0MB

  • MD5

    acf516c320186a58f2890918135f4f20

  • SHA1

    eea744faebabc547fb4853fbdbeaa29e1b048773

  • SHA256

    eea10f813c1089a216ac5d3381d4daa678198a617c08917c92721bde594ea6a8

  • SHA512

    81b2c1eb193a7fbad99a9bcbdfddb0082eaae9cfda41d20d3a9cc112d4c917030aa3dd0ce8300360a1582a769b5c23043260590b123a65a36c95fc700aedb9e8

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYM:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y2

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 8 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.acf516c320186a58f2890918135f4f20.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.acf516c320186a58f2890918135f4f20.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
        • Maps connected drives based on registry
        PID:4008
    • C:\Users\Admin\AppData\Local\Temp\windef.exe
      "C:\Users\Admin\AppData\Local\Temp\windef.exe"
      2⤵
      • Executes dropped EXE
      PID:4776
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:4836
      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
        "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
        3⤵
          PID:3524
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
            4⤵
            • Creates scheduled task(s)
            PID:4336
      • C:\Users\Admin\AppData\Local\Temp\NEAS.acf516c320186a58f2890918135f4f20.exe
        "C:\Users\Admin\AppData\Local\Temp\NEAS.acf516c320186a58f2890918135f4f20.exe"
        2⤵
          PID:2212
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
          2⤵
          • Creates scheduled task(s)
          PID:1396
      • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
        C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
        1⤵
          PID:2900
          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
            "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
            2⤵
              PID:4684
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k
                3⤵
                  PID:2232
              • C:\Users\Admin\AppData\Local\Temp\windef.exe
                "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                2⤵
                  PID:1512

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                Filesize

                405KB

                MD5

                b8ba87ee4c3fc085a2fed0d839aadce1

                SHA1

                b3a2e3256406330e8b1779199bb2b9865122d766

                SHA256

                4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                SHA512

                7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

              • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                Filesize

                405KB

                MD5

                b8ba87ee4c3fc085a2fed0d839aadce1

                SHA1

                b3a2e3256406330e8b1779199bb2b9865122d766

                SHA256

                4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                SHA512

                7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

              • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                Filesize

                405KB

                MD5

                b8ba87ee4c3fc085a2fed0d839aadce1

                SHA1

                b3a2e3256406330e8b1779199bb2b9865122d766

                SHA256

                4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                SHA512

                7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

              • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                Filesize

                405KB

                MD5

                b8ba87ee4c3fc085a2fed0d839aadce1

                SHA1

                b3a2e3256406330e8b1779199bb2b9865122d766

                SHA256

                4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                SHA512

                7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

              • C:\Users\Admin\AppData\Local\Temp\windef.exe

                Filesize

                349KB

                MD5

                b4a202e03d4135484d0e730173abcc72

                SHA1

                01b30014545ea526c15a60931d676f9392ea0c70

                SHA256

                7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                SHA512

                632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

              • C:\Users\Admin\AppData\Local\Temp\windef.exe

                Filesize

                349KB

                MD5

                b4a202e03d4135484d0e730173abcc72

                SHA1

                01b30014545ea526c15a60931d676f9392ea0c70

                SHA256

                7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                SHA512

                632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

              • C:\Users\Admin\AppData\Local\Temp\windef.exe

                Filesize

                349KB

                MD5

                b4a202e03d4135484d0e730173abcc72

                SHA1

                01b30014545ea526c15a60931d676f9392ea0c70

                SHA256

                7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                SHA512

                632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

              • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe

                Filesize

                349KB

                MD5

                b4a202e03d4135484d0e730173abcc72

                SHA1

                01b30014545ea526c15a60931d676f9392ea0c70

                SHA256

                7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                SHA512

                632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

              • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe

                Filesize

                349KB

                MD5

                b4a202e03d4135484d0e730173abcc72

                SHA1

                01b30014545ea526c15a60931d676f9392ea0c70

                SHA256

                7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                SHA512

                632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

              • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe

                Filesize

                2.0MB

                MD5

                93d063ee08be1d4aa3947509dd15eb4d

                SHA1

                70a01bfcdf5b233d07b6a8a774f18fe4fb8fbe40

                SHA256

                4363199ca03c85d0c2da43e08d0a3137cc69882efaa7e6a5e5359c75883255e1

                SHA512

                f7e92f7b954a07c7d0f62b9134f6d613315f1bcf44bcabe93d22bc2b51560ea4da219540b7240ef8f17aa813a05824e24e7e7b163671ab4731aa25b93abdccd9

              • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe

                Filesize

                2.0MB

                MD5

                93d063ee08be1d4aa3947509dd15eb4d

                SHA1

                70a01bfcdf5b233d07b6a8a774f18fe4fb8fbe40

                SHA256

                4363199ca03c85d0c2da43e08d0a3137cc69882efaa7e6a5e5359c75883255e1

                SHA512

                f7e92f7b954a07c7d0f62b9134f6d613315f1bcf44bcabe93d22bc2b51560ea4da219540b7240ef8f17aa813a05824e24e7e7b163671ab4731aa25b93abdccd9

              • memory/2212-20-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/2212-32-0x0000000000400000-0x0000000000420000-memory.dmp

                Filesize

                128KB

              • memory/2496-18-0x00000000010A0000-0x00000000010A1000-memory.dmp

                Filesize

                4KB

              • memory/3524-56-0x0000000006390000-0x000000000639A000-memory.dmp

                Filesize

                40KB

              • memory/3524-54-0x0000000000CE0000-0x0000000000CF0000-memory.dmp

                Filesize

                64KB

              • memory/3524-52-0x0000000072DE0000-0x0000000073590000-memory.dmp

                Filesize

                7.7MB

              • memory/4008-31-0x00000000006E0000-0x000000000077C000-memory.dmp

                Filesize

                624KB

              • memory/4008-38-0x00000000006E0000-0x000000000077C000-memory.dmp

                Filesize

                624KB

              • memory/4008-34-0x0000000000780000-0x0000000000781000-memory.dmp

                Filesize

                4KB

              • memory/4776-40-0x0000000005570000-0x0000000005580000-memory.dmp

                Filesize

                64KB

              • memory/4776-35-0x0000000005AA0000-0x0000000006044000-memory.dmp

                Filesize

                5.6MB

              • memory/4776-45-0x0000000006A10000-0x0000000006A4C000-memory.dmp

                Filesize

                240KB

              • memory/4776-53-0x0000000072DE0000-0x0000000073590000-memory.dmp

                Filesize

                7.7MB

              • memory/4776-44-0x00000000065D0000-0x00000000065E2000-memory.dmp

                Filesize

                72KB

              • memory/4776-43-0x00000000059C0000-0x0000000005A26000-memory.dmp

                Filesize

                408KB

              • memory/4776-25-0x0000000072DE0000-0x0000000073590000-memory.dmp

                Filesize

                7.7MB

              • memory/4776-27-0x0000000000CA0000-0x0000000000CFE000-memory.dmp

                Filesize

                376KB

              • memory/4776-39-0x0000000005620000-0x00000000056B2000-memory.dmp

                Filesize

                584KB