Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 20:23
Behavioral task
behavioral1
Sample
Adobe Download Manager.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Adobe Download Manager.exe
Resource
win10v2004-20231215-en
General
-
Target
Adobe Download Manager.exe
-
Size
2.0MB
-
MD5
cc38554b00499e85149b2c1c0a22473e
-
SHA1
13382965ec47a60dcf07aeadd7414f215099f564
-
SHA256
f8b6eddbe3fd90f45c93cfdaf71fe200371518c6f0c100e2aad9f193d7260c05
-
SHA512
0efe34a59ef8990aa40db6066128f44108c0bce914e450ba69cafae0664c3190cdbdfd0511e42a25e8f4d880e456ef2ccedcd690603e102ae4dcdf7170b2790c
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYP:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YB
Malware Config
Extracted
azorult
http://0x21.in:8000/_az/
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 12 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar behavioral2/memory/3220-30-0x0000000000E60000-0x0000000000EBE000-memory.dmp family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Adobe Download Manager.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation Adobe Download Manager.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process 2688 1788 WerFault.exe 4732 2908 WerFault.exe 2024 4760 WerFault.exe winsock.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2864 schtasks.exe 1920 schtasks.exe 3768 schtasks.exe 1900 schtasks.exe 2780 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Adobe Download Manager.exepid process 4132 Adobe Download Manager.exe 4132 Adobe Download Manager.exe 4132 Adobe Download Manager.exe 4132 Adobe Download Manager.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"2⤵PID:2556
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:3220
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1920
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:4760
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 19844⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vAXCfq2L35ui.bat" "4⤵PID:4084
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:1872
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:2780
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1788 -ip 17881⤵PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 5481⤵
- Program crash
PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k1⤵PID:3760
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:2908
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵PID:4272
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:1900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2908 -ip 29081⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 5201⤵
- Program crash
PID:4732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k1⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4760 -ip 47601⤵PID:4000
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost1⤵
- Runs ping.exe
PID:4908
-
C:\Windows\SysWOW64\chcp.comchcp 650011⤵PID:4928
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:544
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
208B
MD5c0cdac37b9208af4ad8e7211e9df3c18
SHA168ced3ede1d55cb49260d7379f47503d6d638a05
SHA256b8c2ebd98e3729563822b96c65649b10a0df27bf82f7161dfc0cab2b1b9fa65b
SHA51218a82b7bd2b861bac1e128b1fdb95a103dfb3e2f5904ec7e2c4b32cf30904a59d98f24cda4db69e73f21b74a8c3162e864b40cb7096567116348162563cc75ce
-
Filesize
85KB
MD54016820a838b50d0bdb6fd862545f46c
SHA1d000f79c9e936b64ed168af3a106692b151df3fb
SHA256b0b3abe7dd0a7d5abd8147907591d8016ba030a79c77194dcddd9cef72269711
SHA5121a54ed704f78dc50fe3c3f462733105f314516fd8e8ab61d75bad3e5a7d40615da385b776679a0bbf4a6de64ef01487e52443ca005b549045d1ab91bc37d9903
-
Filesize
23KB
MD50a6e7db009729200b48717fdd9c1d642
SHA140b9666d9ddf17c32f52092c923a7fd8968f330b
SHA2562a2a0e2ef6ac66ec1478e61312781bb4e881e10c919465013bcc7876865a26d7
SHA51223a0ec8605b8cfaef99f026804f6f56d698aec93c9a1246558b5a878428ff8dce9d573cc01de926ff33498c86870ad980c1f1e4a8f020d02723198240dfb1cf5
-
Filesize
19KB
MD561908888a2d030905d222ec15837f121
SHA180ecd22e4693b3786d7d6f041880a3426139f2e4
SHA256253a1ed40fd5c3d2480335dca1b8ee8bdfe5940acd203fce3b403d6066790687
SHA512b56b776c8f88f5777649d8e9a07ca3cb49bf4cedddd5d923d031a5acc9b260e3941784cebbd127bc3d178077aba998f0a02c4b040fbce1430d01a3dab0efaa98
-
Filesize
14KB
MD599c124f171571d4d7b00a89377e42c21
SHA1e8f066fe6a18b17468ce8af593f49839ca817a7b
SHA2563426f963373b8c9cd8c1c64cf46f55f14ddc3b2de4e8723335fb504d29ac176b
SHA512f60923f0bbff97b335d6b5b333fcafc66330deace640ec775f05e1c630651e1ca6e23c9469935f69ac22ee9aa14cb09f8c1d606a080b632d6b1db64533884ea9
-
Filesize
15KB
MD569c9d8e6edbfd85a67ca17e1b3409567
SHA177a8b2069f98ada17e3d01b9d8919706b2685505
SHA256d97564ab56ed6753b55d6efa40071588b26042671c80adbc65173681c4bf9cff
SHA51282c70278ec668cf972eca02aa2620d591d08d3ebe91770da13ee85dacfb03d3df55347285b7958dad4d0c8eb85bb990ec295fed4e845cd0e2de78b6519a47aa9
-
Filesize
16KB
MD58bc4e97436c93b42447b6a860e2e2609
SHA18f71874211d5a2fff25e09edb33f29bc5294e098
SHA2565d7fee26f80b40cf9e121f5b0f635205da0135ea64c51ef1592c83add57e67c5
SHA512727353b8e942ea7e5a46b97b015eea6a46b82139a3359175754767b03ab5278c9dcdeb6a4b4c3d3a22c01f59f697e95717fdfe3b72ce7f1aaba1c92e4bf8b534
-
Filesize
20KB
MD585fb332cd494b1e714e92a5926837ff0
SHA1d1da4bd0834623565e660f1a633d37b4855c8f5e
SHA25637f895bef6803ab403bf3ef98d4d10cf8e3693592da2154959840500e61a5779
SHA512aad09722731efd32ccc041271303d4adc12a9873348c0fb53eb2bd3c6f77897ac724b959ee506e1a28c43d423c91360056d5e247e50c39453c439505a44f37c1
-
Filesize
45KB
MD5d9fed023cecf2dfe80a16b0ce9fca05a
SHA1034847f9bf2a6ee445fde02998b9bc0cb4e1302f
SHA256a309f41892792675192c178801c275ee17997af30727d79d9857f032485fd7ae
SHA5129dab918b021e4064b5bf3c62d798522aa30aba0efaf2f08cf3ea381cfb01bbb6c8e56c7b719f2e57b156505750b43f275ca1d7e81b5efe6342191f4f4746eb02
-
Filesize
17KB
MD526da22ce7bfd556eb2569f45df28fbf3
SHA1089d18d6999fd99c280273d055626557d1971ed8
SHA25634b55af33580d70caa4f87969a740b5def33ed4b9c6e2c6478e63f000fc63c8a
SHA5125d794ff044c11f3ac9eda524c9a221f3e8911ab548253222305277723e9a11fd5dc35e34a7fa837e1aedfd8329710fceeda2c900758ad1c02e11de15924128e4
-
Filesize
224B
MD54aa278c6efd7537aeb963129e1279a97
SHA12474af7d96a7832e2fa44b113e2da263cd54da2f
SHA2561038fe8f65d0ff7368eebdc49a4c6102eb99e5e016577d50a7e8eda1a865a369
SHA5124db243892f9366bdbf1291f3898ef3294bf9b426a1aa438269b25381367dde53cf3287488648aff5dc03d20fe957f3caaeb28dd14254649799eef6d16a76d01c
-
Filesize
11KB
MD5be0b864c5ffc50ea4896efd1566f0d2f
SHA1b053320a3c00612f00541cdc599ae455a89c2aae
SHA256a3cc5c8f97f4bf8f86b823ebe90939e8f35d15ce74066b1c4b817a89d013c47d
SHA51270bbb3de9a25397a24605b1885ada84327126bde1268e0f5b65b6b17b5ca959ef88eda5112aba3cce47d2c885a19d86a7b99be10c190920a5fcb3fe4e508b928
-
Filesize
24KB
MD508e291222cd58eaa01d3f03de45baa3b
SHA1521e28e6cc6607547212766b92232c88f3e6c0be
SHA2562a5844d9dd48ef4aa7fe41bcf219e01b8364849840fbc3f4e3a9dc36ef2a12eb
SHA512f49faf03ae6396569a4248159c71d06e3163051bc98bd164cfd807963add1c182e0140b3dbbf0f79520faf8250ccac368602612f468a2083118db25e0a836814
-
Filesize
13KB
MD51f80b97032671e04d4f854a88e568dd6
SHA1a27f7065ffa24bb51357add355b1e83212cb570a
SHA2564505f7a53c472cd3f6597194c2d76b5be7c7dfa8a1b0851530cb88c008a5f9e1
SHA5129ba9610aca341c923a67e7c4e9a4f93fcdc088392f0c3bb9b856870a37bd26134d1ec2941fd8c1d005e9b525a5a64d6638fef7d215288c402c87d030a256d165
-
Filesize
6KB
MD5eaaa6ed036cde12ef9e5be2089b4b0e6
SHA1ac821aea0dc22f4a9fea928d5ab15235a94359b5
SHA256d9589d0b54170e9cc7546418c62aa5c4854bededb923f045b0e528bcb1eef198
SHA512a6fb0720511e58a91e3eb1683404926cfaa2a0b6e3713df4dff7191021058206797112ffb91fe89a49bf9af684603b0707b212f6265bdaf755148a512ffbe304
-
Filesize
1KB
MD51d0a7b7b8ccf66c0e56f4444a91947bd
SHA16bb8d1d772ffc3ea8984c338450e3e692b9a53d3
SHA256d44f3f8b2745a31b509ecbf505b0fe5bfc4cab0da576b3c30ea95c8c2df6a1a4
SHA5129bc7e85b2f7954af0432c6d0a9b6c904c4a567c901e9bd5828bd4fd9c180d422845a89dbaa64b1548fd24b229c7197dc4388d9304492f4e7b950ff9470c251fe
-
Filesize
29KB
MD5d30e5f95545ecc17faf71970c55f4ee2
SHA1d25d9bdf5491ea3f34a8633b4372b4453ee09791
SHA256a51f1fae8cea2fb492e78881d5a4b25f186d27034fed66584f9d2bc99edb5bbf
SHA512b78e08be018e1e624b54449adf958aedd60ba8cf37baa4815f633236b8163a6308327265854a9b795716ef5195caf5b4aafe17c2394077dcd1a30c97ccb15682