Analysis

  • max time kernel
    0s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 20:23

General

  • Target

    Adobe Download Manager.exe

  • Size

    2.0MB

  • MD5

    cc38554b00499e85149b2c1c0a22473e

  • SHA1

    13382965ec47a60dcf07aeadd7414f215099f564

  • SHA256

    f8b6eddbe3fd90f45c93cfdaf71fe200371518c6f0c100e2aad9f193d7260c05

  • SHA512

    0efe34a59ef8990aa40db6066128f44108c0bce914e450ba69cafae0664c3190cdbdfd0511e42a25e8f4d880e456ef2ccedcd690603e102ae4dcdf7170b2790c

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYP:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YB

Malware Config

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 12 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"
      2⤵
        PID:2556
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
        2⤵
        • Creates scheduled task(s)
        PID:2864
      • C:\Users\Admin\AppData\Local\Temp\windef.exe
        "C:\Users\Admin\AppData\Local\Temp\windef.exe"
        2⤵
          PID:3220
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
            3⤵
            • Creates scheduled task(s)
            PID:1920
          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
            3⤵
              PID:4760
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                4⤵
                • Creates scheduled task(s)
                PID:3768
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 1984
                4⤵
                • Program crash
                PID:2024
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vAXCfq2L35ui.bat" "
                4⤵
                  PID:4084
                  • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                    "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                    5⤵
                      PID:1872
                      • C:\Windows\SysWOW64\schtasks.exe
                        "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                        6⤵
                        • Creates scheduled task(s)
                        PID:2780
              • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                2⤵
                  PID:1788
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1788 -ip 1788
                1⤵
                  PID:1848
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 548
                  1⤵
                  • Program crash
                  PID:2688
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k
                  1⤵
                    PID:3760
                  • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                    C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                    1⤵
                      PID:4916
                      • C:\Users\Admin\AppData\Local\Temp\windef.exe
                        "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                        2⤵
                          PID:3008
                        • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                          "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                          2⤵
                            PID:2908
                          • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                            "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"
                            2⤵
                              PID:4272
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                              2⤵
                              • Creates scheduled task(s)
                              PID:1900
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2908 -ip 2908
                            1⤵
                              PID:3412
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 520
                              1⤵
                              • Program crash
                              PID:4732
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k
                              1⤵
                                PID:2856
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4760 -ip 4760
                                1⤵
                                  PID:4000
                                • C:\Windows\SysWOW64\PING.EXE
                                  ping -n 10 localhost
                                  1⤵
                                  • Runs ping.exe
                                  PID:4908
                                • C:\Windows\SysWOW64\chcp.com
                                  chcp 65001
                                  1⤵
                                    PID:4928
                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                    1⤵
                                      PID:544
                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                      1⤵
                                        PID:3568

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v13

                                      Execution

                                      Scheduled Task/Job

                                      1
                                      T1053

                                      Persistence

                                      Scheduled Task/Job

                                      1
                                      T1053

                                      Privilege Escalation

                                      Scheduled Task/Job

                                      1
                                      T1053

                                      Discovery

                                      Query Registry

                                      1
                                      T1012

                                      System Information Discovery

                                      2
                                      T1082

                                      Remote System Discovery

                                      1
                                      T1018

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windef.exe.log
                                        Filesize

                                        1KB

                                        MD5

                                        10eab9c2684febb5327b6976f2047587

                                        SHA1

                                        a12ed54146a7f5c4c580416aecb899549712449e

                                        SHA256

                                        f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

                                        SHA512

                                        7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

                                      • C:\Users\Admin\AppData\Local\Temp\vAXCfq2L35ui.bat
                                        Filesize

                                        208B

                                        MD5

                                        c0cdac37b9208af4ad8e7211e9df3c18

                                        SHA1

                                        68ced3ede1d55cb49260d7379f47503d6d638a05

                                        SHA256

                                        b8c2ebd98e3729563822b96c65649b10a0df27bf82f7161dfc0cab2b1b9fa65b

                                        SHA512

                                        18a82b7bd2b861bac1e128b1fdb95a103dfb3e2f5904ec7e2c4b32cf30904a59d98f24cda4db69e73f21b74a8c3162e864b40cb7096567116348162563cc75ce

                                      • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                        Filesize

                                        85KB

                                        MD5

                                        4016820a838b50d0bdb6fd862545f46c

                                        SHA1

                                        d000f79c9e936b64ed168af3a106692b151df3fb

                                        SHA256

                                        b0b3abe7dd0a7d5abd8147907591d8016ba030a79c77194dcddd9cef72269711

                                        SHA512

                                        1a54ed704f78dc50fe3c3f462733105f314516fd8e8ab61d75bad3e5a7d40615da385b776679a0bbf4a6de64ef01487e52443ca005b549045d1ab91bc37d9903

                                      • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                        Filesize

                                        23KB

                                        MD5

                                        0a6e7db009729200b48717fdd9c1d642

                                        SHA1

                                        40b9666d9ddf17c32f52092c923a7fd8968f330b

                                        SHA256

                                        2a2a0e2ef6ac66ec1478e61312781bb4e881e10c919465013bcc7876865a26d7

                                        SHA512

                                        23a0ec8605b8cfaef99f026804f6f56d698aec93c9a1246558b5a878428ff8dce9d573cc01de926ff33498c86870ad980c1f1e4a8f020d02723198240dfb1cf5

                                      • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                        Filesize

                                        19KB

                                        MD5

                                        61908888a2d030905d222ec15837f121

                                        SHA1

                                        80ecd22e4693b3786d7d6f041880a3426139f2e4

                                        SHA256

                                        253a1ed40fd5c3d2480335dca1b8ee8bdfe5940acd203fce3b403d6066790687

                                        SHA512

                                        b56b776c8f88f5777649d8e9a07ca3cb49bf4cedddd5d923d031a5acc9b260e3941784cebbd127bc3d178077aba998f0a02c4b040fbce1430d01a3dab0efaa98

                                      • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                        Filesize

                                        14KB

                                        MD5

                                        99c124f171571d4d7b00a89377e42c21

                                        SHA1

                                        e8f066fe6a18b17468ce8af593f49839ca817a7b

                                        SHA256

                                        3426f963373b8c9cd8c1c64cf46f55f14ddc3b2de4e8723335fb504d29ac176b

                                        SHA512

                                        f60923f0bbff97b335d6b5b333fcafc66330deace640ec775f05e1c630651e1ca6e23c9469935f69ac22ee9aa14cb09f8c1d606a080b632d6b1db64533884ea9

                                      • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                        Filesize

                                        15KB

                                        MD5

                                        69c9d8e6edbfd85a67ca17e1b3409567

                                        SHA1

                                        77a8b2069f98ada17e3d01b9d8919706b2685505

                                        SHA256

                                        d97564ab56ed6753b55d6efa40071588b26042671c80adbc65173681c4bf9cff

                                        SHA512

                                        82c70278ec668cf972eca02aa2620d591d08d3ebe91770da13ee85dacfb03d3df55347285b7958dad4d0c8eb85bb990ec295fed4e845cd0e2de78b6519a47aa9

                                      • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                        Filesize

                                        16KB

                                        MD5

                                        8bc4e97436c93b42447b6a860e2e2609

                                        SHA1

                                        8f71874211d5a2fff25e09edb33f29bc5294e098

                                        SHA256

                                        5d7fee26f80b40cf9e121f5b0f635205da0135ea64c51ef1592c83add57e67c5

                                        SHA512

                                        727353b8e942ea7e5a46b97b015eea6a46b82139a3359175754767b03ab5278c9dcdeb6a4b4c3d3a22c01f59f697e95717fdfe3b72ce7f1aaba1c92e4bf8b534

                                      • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                        Filesize

                                        20KB

                                        MD5

                                        85fb332cd494b1e714e92a5926837ff0

                                        SHA1

                                        d1da4bd0834623565e660f1a633d37b4855c8f5e

                                        SHA256

                                        37f895bef6803ab403bf3ef98d4d10cf8e3693592da2154959840500e61a5779

                                        SHA512

                                        aad09722731efd32ccc041271303d4adc12a9873348c0fb53eb2bd3c6f77897ac724b959ee506e1a28c43d423c91360056d5e247e50c39453c439505a44f37c1

                                      • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                        Filesize

                                        45KB

                                        MD5

                                        d9fed023cecf2dfe80a16b0ce9fca05a

                                        SHA1

                                        034847f9bf2a6ee445fde02998b9bc0cb4e1302f

                                        SHA256

                                        a309f41892792675192c178801c275ee17997af30727d79d9857f032485fd7ae

                                        SHA512

                                        9dab918b021e4064b5bf3c62d798522aa30aba0efaf2f08cf3ea381cfb01bbb6c8e56c7b719f2e57b156505750b43f275ca1d7e81b5efe6342191f4f4746eb02

                                      • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                        Filesize

                                        17KB

                                        MD5

                                        26da22ce7bfd556eb2569f45df28fbf3

                                        SHA1

                                        089d18d6999fd99c280273d055626557d1971ed8

                                        SHA256

                                        34b55af33580d70caa4f87969a740b5def33ed4b9c6e2c6478e63f000fc63c8a

                                        SHA512

                                        5d794ff044c11f3ac9eda524c9a221f3e8911ab548253222305277723e9a11fd5dc35e34a7fa837e1aedfd8329710fceeda2c900758ad1c02e11de15924128e4

                                      • C:\Users\Admin\AppData\Roaming\Logs\12-22-2023
                                        Filesize

                                        224B

                                        MD5

                                        4aa278c6efd7537aeb963129e1279a97

                                        SHA1

                                        2474af7d96a7832e2fa44b113e2da263cd54da2f

                                        SHA256

                                        1038fe8f65d0ff7368eebdc49a4c6102eb99e5e016577d50a7e8eda1a865a369

                                        SHA512

                                        4db243892f9366bdbf1291f3898ef3294bf9b426a1aa438269b25381367dde53cf3287488648aff5dc03d20fe957f3caaeb28dd14254649799eef6d16a76d01c

                                      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                        Filesize

                                        11KB

                                        MD5

                                        be0b864c5ffc50ea4896efd1566f0d2f

                                        SHA1

                                        b053320a3c00612f00541cdc599ae455a89c2aae

                                        SHA256

                                        a3cc5c8f97f4bf8f86b823ebe90939e8f35d15ce74066b1c4b817a89d013c47d

                                        SHA512

                                        70bbb3de9a25397a24605b1885ada84327126bde1268e0f5b65b6b17b5ca959ef88eda5112aba3cce47d2c885a19d86a7b99be10c190920a5fcb3fe4e508b928

                                      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                        Filesize

                                        24KB

                                        MD5

                                        08e291222cd58eaa01d3f03de45baa3b

                                        SHA1

                                        521e28e6cc6607547212766b92232c88f3e6c0be

                                        SHA256

                                        2a5844d9dd48ef4aa7fe41bcf219e01b8364849840fbc3f4e3a9dc36ef2a12eb

                                        SHA512

                                        f49faf03ae6396569a4248159c71d06e3163051bc98bd164cfd807963add1c182e0140b3dbbf0f79520faf8250ccac368602612f468a2083118db25e0a836814

                                      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                        Filesize

                                        13KB

                                        MD5

                                        1f80b97032671e04d4f854a88e568dd6

                                        SHA1

                                        a27f7065ffa24bb51357add355b1e83212cb570a

                                        SHA256

                                        4505f7a53c472cd3f6597194c2d76b5be7c7dfa8a1b0851530cb88c008a5f9e1

                                        SHA512

                                        9ba9610aca341c923a67e7c4e9a4f93fcdc088392f0c3bb9b856870a37bd26134d1ec2941fd8c1d005e9b525a5a64d6638fef7d215288c402c87d030a256d165

                                      • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                        Filesize

                                        6KB

                                        MD5

                                        eaaa6ed036cde12ef9e5be2089b4b0e6

                                        SHA1

                                        ac821aea0dc22f4a9fea928d5ab15235a94359b5

                                        SHA256

                                        d9589d0b54170e9cc7546418c62aa5c4854bededb923f045b0e528bcb1eef198

                                        SHA512

                                        a6fb0720511e58a91e3eb1683404926cfaa2a0b6e3713df4dff7191021058206797112ffb91fe89a49bf9af684603b0707b212f6265bdaf755148a512ffbe304

                                      • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                        Filesize

                                        1KB

                                        MD5

                                        1d0a7b7b8ccf66c0e56f4444a91947bd

                                        SHA1

                                        6bb8d1d772ffc3ea8984c338450e3e692b9a53d3

                                        SHA256

                                        d44f3f8b2745a31b509ecbf505b0fe5bfc4cab0da576b3c30ea95c8c2df6a1a4

                                        SHA512

                                        9bc7e85b2f7954af0432c6d0a9b6c904c4a567c901e9bd5828bd4fd9c180d422845a89dbaa64b1548fd24b229c7197dc4388d9304492f4e7b950ff9470c251fe

                                      • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                        Filesize

                                        29KB

                                        MD5

                                        d30e5f95545ecc17faf71970c55f4ee2

                                        SHA1

                                        d25d9bdf5491ea3f34a8633b4372b4453ee09791

                                        SHA256

                                        a51f1fae8cea2fb492e78881d5a4b25f186d27034fed66584f9d2bc99edb5bbf

                                        SHA512

                                        b78e08be018e1e624b54449adf958aedd60ba8cf37baa4815f633236b8163a6308327265854a9b795716ef5195caf5b4aafe17c2394077dcd1a30c97ccb15682

                                      • memory/1872-92-0x0000000004D10000-0x0000000004D20000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/1872-91-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/1872-96-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/1872-95-0x0000000004D10000-0x0000000004D20000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/2556-29-0x0000000000400000-0x0000000000420000-memory.dmp
                                        Filesize

                                        128KB

                                      • memory/2556-19-0x0000000000400000-0x0000000000420000-memory.dmp
                                        Filesize

                                        128KB

                                      • memory/3008-71-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/3008-83-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/3008-72-0x00000000055F0000-0x0000000005600000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/3220-36-0x00000000058C0000-0x0000000005926000-memory.dmp
                                        Filesize

                                        408KB

                                      • memory/3220-28-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/3220-46-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/3220-30-0x0000000000E60000-0x0000000000EBE000-memory.dmp
                                        Filesize

                                        376KB

                                      • memory/3220-35-0x0000000005950000-0x0000000005960000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/3220-34-0x0000000005960000-0x00000000059F2000-memory.dmp
                                        Filesize

                                        584KB

                                      • memory/3220-33-0x0000000005D90000-0x0000000006334000-memory.dmp
                                        Filesize

                                        5.6MB

                                      • memory/3220-37-0x0000000006720000-0x0000000006732000-memory.dmp
                                        Filesize

                                        72KB

                                      • memory/3220-38-0x0000000006C60000-0x0000000006C9C000-memory.dmp
                                        Filesize

                                        240KB

                                      • memory/4132-20-0x0000000003AA0000-0x0000000003AA1000-memory.dmp
                                        Filesize

                                        4KB

                                      • memory/4272-73-0x0000000000A40000-0x0000000000A60000-memory.dmp
                                        Filesize

                                        128KB

                                      • memory/4272-82-0x0000000000A40000-0x0000000000A60000-memory.dmp
                                        Filesize

                                        128KB

                                      • memory/4760-89-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/4760-84-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/4760-49-0x0000000006F50000-0x0000000006F5A000-memory.dmp
                                        Filesize

                                        40KB

                                      • memory/4760-45-0x0000000073380000-0x0000000073B30000-memory.dmp
                                        Filesize

                                        7.7MB

                                      • memory/4760-47-0x0000000005820000-0x0000000005830000-memory.dmp
                                        Filesize

                                        64KB