Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-12-2023 01:19

General

  • Target

    f859bddda5d049e5449032b8a4373515a6a06cbc2019f9fc1c0c269ba4d90153.exe

  • Size

    2.0MB

  • MD5

    2e9ba9334449304220a549e7a75447f4

  • SHA1

    791d1648ee703e05b4749fcb99c8f45692e73787

  • SHA256

    f859bddda5d049e5449032b8a4373515a6a06cbc2019f9fc1c0c269ba4d90153

  • SHA512

    91f5e99e4e69ece69f1eb4a72b69bf77e42092ad2bb40d6f480768148a2490f3bf747b507b3a52446d60eb53373f7f3b64d16fe1993e58dd10ec0430cf91bcff

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY1:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YL

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 18 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f859bddda5d049e5449032b8a4373515a6a06cbc2019f9fc1c0c269ba4d90153.exe
    "C:\Users\Admin\AppData\Local\Temp\f859bddda5d049e5449032b8a4373515a6a06cbc2019f9fc1c0c269ba4d90153.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 160
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2608
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
          PID:3008
      • C:\Users\Admin\AppData\Local\Temp\f859bddda5d049e5449032b8a4373515a6a06cbc2019f9fc1c0c269ba4d90153.exe
        "C:\Users\Admin\AppData\Local\Temp\f859bddda5d049e5449032b8a4373515a6a06cbc2019f9fc1c0c269ba4d90153.exe"
        2⤵
          PID:2676
        • C:\Users\Admin\AppData\Local\Temp\windef.exe
          "C:\Users\Admin\AppData\Local\Temp\windef.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1756
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
            3⤵
            • Creates scheduled task(s)
            PID:2976
          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2264
            • C:\Windows\SysWOW64\schtasks.exe
              "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
              4⤵
              • Creates scheduled task(s)
              PID:1284
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 1444
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:2556
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\RMAEtuD5Vwt1.bat" "
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:644
              • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                5⤵
                • Executes dropped EXE
                PID:784
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 10 localhost
        1⤵
        • Runs ping.exe
        PID:2760
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        1⤵
          PID:2968

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Execution

        Scheduled Task/Job

        1
        T1053

        Persistence

        Scheduled Task/Job

        1
        T1053

        Privilege Escalation

        Scheduled Task/Job

        1
        T1053

        Discovery

        System Information Discovery

        1
        T1082

        Remote System Discovery

        1
        T1018

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RMAEtuD5Vwt1.bat
          Filesize

          208B

          MD5

          3eb566a1533e23a08da510e2d67f15d4

          SHA1

          9f5b4127518ff572c2fe55a8cae9f4d241f45a15

          SHA256

          dbffbacb5218bdac25cd8a26e83eef28abc33ad98a3d061837865dee1bc811bc

          SHA512

          04c045ce28881c0245d8a0e57588a5f65b6e298c90770b5ae8007231e20804dd624b9cf70dc5d37387025112ff7241cb6fd865f297876f7c76aaaa56b33282aa

        • C:\Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          265KB

          MD5

          38f4a51429a032b42ac85852f21f0025

          SHA1

          b8e26c4e1b54655ba52961a920b02d1431ddc9e5

          SHA256

          1525c7ed01ae0f63936546f1cf49ba9123dcac936ae532f78ebde9f7fdf1010f

          SHA512

          ecc650dce9635ca936521e48e76f715dcbcb00a5a16fa8c5d484d3967b7e43dc87c7b04da3c77a88b895f98cc3f37e644f54b218fc57c04f32a4fda035c9564d

        • C:\Users\Admin\AppData\Local\Temp\windef.exe
          Filesize

          227KB

          MD5

          ddb2882858684c7e5120ea3145cb3b41

          SHA1

          3d109d979b38bcfc8b06c53566c904508ddfe276

          SHA256

          f4d52020e1c5ef0b1dc62fe24e80a40d60082436f5947013b3c3ca52cdda1856

          SHA512

          088eccae366250e509836a0a5604b64b9fa91242e1f9443ce37687fd039c38566fa89dde8869362b2d8e6153b32f16c1e85d24ed81e515d136732aa7a708e048

        • C:\Users\Admin\AppData\Local\Temp\windef.exe
          Filesize

          169KB

          MD5

          18bcfc6f058247a20329d559c51ce8e1

          SHA1

          d76afe68e8bcd6aecf77f6d75ceb5855688da661

          SHA256

          2b67ee5830669487c2aa21f62d9edfee5bbd563d43414a16f38a76e50f2686a8

          SHA512

          8b50585609c668f89aba156f1a54dc530763502a2542741bd68170cc799a2ac7a29ac3f249c3c4c856df123e78cb819597b2c4f966be006ef95dba5b9103e34c

        • C:\Users\Admin\AppData\Local\Temp\windef.exe
          Filesize

          237KB

          MD5

          ede1e26742a2d9c918a12767c32a5b87

          SHA1

          d8ea5f5a934546f49a58417f34d6f5d962d2d12a

          SHA256

          10327f2309c6d8fa852e2e07baa35f994759f58746ac5eeac53cbfc9999eeec9

          SHA512

          96776ca5826e44372a49a63c3aa86ada7cfe398e23fcb8e2149d3b9b5a1621390fe0b270ea0981de4d9e8953b7fe13825eaecee8bee7563cc20ad1ec5dd55ad7

        • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          139KB

          MD5

          1cf708ba2b5e7a960cf7922c34d784ed

          SHA1

          9cbedc6db5576712605017cf2068b8be0d4f5fd4

          SHA256

          3ef019c56000b9f68ce03e5532bad1f4953ec2db2b4427b94e779fec500ffa2c

          SHA512

          13f32a1740e225ad3670ebc49714554de8c4fc95c1320fea0e4fbf74eb8aaca409e9702b7e982018b08306e46f0fcbfb890b9edc385d7f126260f8db3f35fb2c

        • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          144KB

          MD5

          57868e3e731145ea4e5b7baadcee8372

          SHA1

          b2178e9a018ac9cd7461f86b9fff8d8800c32102

          SHA256

          9f92fd8431854a9a6acb2a4c69ecce89c5277ade31f95b264c1317f0349d56b9

          SHA512

          e36526b00b9c571c90fe363207e90dc33d9f16acb7ad85c47a08ad73ec6f2a34ba75da0f1c3de6294ee64e102bc6bb4ab9d66a1ccd15d87623e2891ca2ea9420

        • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          239KB

          MD5

          18b87b1f45d773c87e27b85ed7e67710

          SHA1

          10895fec46abef3544ef517665429dd6082e1121

          SHA256

          bb174d9a8f835ec2d805bf9c42196a90ec8f94c60caa9882d2e66007c97279b0

          SHA512

          89127ace88c1ba7472430db64e1687a5fbd68b1d87c5c75922f012bb7750b6b7ad41029e7fc7be9f25622ff74d114f3edf887fc85c6c4c86e28ec93c37680c76

        • \Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          279KB

          MD5

          39fa100a82a32c8cfe93dd9820b6346b

          SHA1

          6118c007c35f7ccda1c4a5a1f8526a56bdc9bcf4

          SHA256

          f4609cf2f8fe17cc628324df1e923099a367349136f1aface618d17c4b707e53

          SHA512

          ea8d9c968f4850d7b5561ab36303e75c04589ce540f7e4cd2f26de53779fc3c2eff372e0a8a9d0b2cff93ef186e6b8e828e296a161a59c2a2bcd4e0035f9f327

        • \Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          405KB

          MD5

          b8ba87ee4c3fc085a2fed0d839aadce1

          SHA1

          b3a2e3256406330e8b1779199bb2b9865122d766

          SHA256

          4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

          SHA512

          7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

        • \Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          136KB

          MD5

          4d68a89e677ec05d4d416343ccd4b121

          SHA1

          a27654f6a8514976fefcccdfeb699d8c3b7a89c1

          SHA256

          2987f59b4eacc476e2090214370b2eb422b352d7337bf3082794833a361f3556

          SHA512

          18baeecf9849ce7c9e5af97c2489694941d1e050ef316581b780e5e0a680666746cb94f72c7ea1eed3d6d246d283ebb9961f5261af40ac43c35791d9611aff44

        • \Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          111KB

          MD5

          caa4a2e0e94a2e858f35c4238269f45b

          SHA1

          db6107ada59ebab4474d16f36cd6ac99ab555249

          SHA256

          ce987d87e7aec3aef5c23849b29a6d10cf246c92ad40c83fb643d2ed41f1173a

          SHA512

          0f3cb108c534f67c2a1dea6f7abb45fd6902f1a53767a28c462c55a348621d09bcfcdf221c82f719d4711437f1b259e64583ce9fbd0f7fe790fc68774f9e832c

        • \Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          125KB

          MD5

          c0a599f5380ffd0c1c6a00f31e9a5d6e

          SHA1

          b0c97f01bbf9f7cfbb8d0884bd26a3aae131803f

          SHA256

          446fd7f1eea4c808ccf13cb3d2f18e119fead641b55d42693a041a0c39e94f75

          SHA512

          f45e02478af102fe172da33a0eb04ca2931d3c6d31041a66d94b5a8804c06db8d46a74c69093c3b395aa0afdc60df470e64f1c822a61d7c764c7fb48f7fa943f

        • \Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          105KB

          MD5

          fe5809d7a9a6d84785e4dca4485716ba

          SHA1

          ba3af391907a31d7399d459b4cc25c04e9d0875e

          SHA256

          d317b10dd65ae0f1cd43c404486c5bc5292bda6deb8fa0e9718d32bb1d5626a5

          SHA512

          88ea75d02513a951b27ff46236efe9371466a6d6ce1627a1eb1e59927732b3c679c75204d4dc835ac1bf80a0fd5233303e3d1b7557b685d59cb2787818af5032

        • \Users\Admin\AppData\Local\Temp\vnc.exe
          Filesize

          201KB

          MD5

          6feb8bdca6fbff3b47dfe87f27f2bcbf

          SHA1

          3599fa70cf85ad54005b8dba34a02e65744146b7

          SHA256

          115bd858ee0cd005cf56509d6e9b334a9502e90ce45c2b5f1b2636a9e5e85ef1

          SHA512

          9d82f6b631bb02f401d079efcdb99c0482a0d23b7949ec89fe19ef3b1cb6b9db317d10069d82619243ff5cd1f9671d72a0d6aeb270ae7b55e583d4fe63a7d26d

        • \Users\Admin\AppData\Local\Temp\windef.exe
          Filesize

          257KB

          MD5

          092781a57f322e12974a231cff5a1306

          SHA1

          92e4baa689cdc3c3ed321028f1aad3b8e6beaca3

          SHA256

          46aa409495fea1a2e7f9c7fc3dbd160aeddeb8880a9c24d933ed1a59026d6475

          SHA512

          3e835fe03826ba20b110f9a94b2849d0b6b9f2cdade54ab55c6285044f3f12776e097a3bfdfbd7aecb807fea9fc3810da1d4fe40d09dfdc94a006385dc062136

        • \Users\Admin\AppData\Local\Temp\windef.exe
          Filesize

          211KB

          MD5

          45d1fd3b8a5f49a6a52fa1320b08c2d1

          SHA1

          6649f7988b78461b60dd5d7b25242c002af5b7a0

          SHA256

          26556e2002f786265f2c52afe8329158466c2f590ee9d1a359e2f22a877f8a62

          SHA512

          2de08aac7a739928cc7927236d330c7a412298333be679a82453dfc447ea1c9a3206662f3f8156d337e496e319727f4619c0cb4ce883cd5755108006ba02bc07

        • \Users\Admin\AppData\Local\Temp\windef.exe
          Filesize

          257KB

          MD5

          be9548a97bbb6903771e486e8e3fa7e2

          SHA1

          26d0f60a6c8b11190a1277a88ecf6f0ee39f07d5

          SHA256

          6ae79d31d0647cad2384223004166624c5b5749399df0eea80fb933fd1b46785

          SHA512

          a66c750ddc2b8d6f9a140e1fe64f3ad70278acb32f557bdd369a3cac588d86b9a5e6307b48f9c7277aaa7522893fd5b24b2badb555f6bb838fad0633c8cb82c5

        • \Users\Admin\AppData\Local\Temp\windef.exe
          Filesize

          349KB

          MD5

          b4a202e03d4135484d0e730173abcc72

          SHA1

          01b30014545ea526c15a60931d676f9392ea0c70

          SHA256

          7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

          SHA512

          632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

        • \Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          240KB

          MD5

          49f5eca4755dc9deb85795083e28beb8

          SHA1

          58038a2b8d64fc6f0e2628580ecafc70e850543d

          SHA256

          92bb57da45d4168a4f0903f53a74c02a83c1733944c27ab736f3d75ca5d20df0

          SHA512

          457739e0f39fa53a2e699f472e0541d9a3dd92f7af32eb9e69ee69c5d83fe002249971dfd8d7995ae7da38dfdb59ef65d0661f85781439d8596f8748010ed101

        • \Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          113KB

          MD5

          fd73dbc34a74ff56dd7cca7c0664e548

          SHA1

          9c6f667a1e43eb8d177db6384a93938aff75ddba

          SHA256

          6711b593ff81926abba66e3cf1bebeac70e7b6f5a7a4997a48b9b41033a3416b

          SHA512

          c55ccc73384d73aea4cef0ffab72eee7041d4185330c9e32237d4d894dd0236e63f51be26666e33e8f638a42ebc00a0873cdcb685a6df23bde1f5059baa1fbe0

        • \Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          198KB

          MD5

          9718da345dfd7083244fba1dbd7bfaa3

          SHA1

          ca8becffc4191b0bdf919f9634771fd0466f6f28

          SHA256

          e19120e51e3692b28d0d75566711a0b70eee0335c3ee906f5a2358c7704e7bcb

          SHA512

          2f843fb2e12a969bc1b6bc2018b6e37f0e6f3384394a6ed0a61370f586f142ae58febe35d375a83efc80077862a3588446b344f4cba5cfa5985add6fa18f1001

        • \Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          250KB

          MD5

          de4c3159a44260b359226244d8827186

          SHA1

          7cde4f969a27bdba62f2f7e932a3748cdbb68c52

          SHA256

          094cad6acf8cb9d18c2824052420af3cab9a1b61998c78f24665ecc35c53ea9a

          SHA512

          d0b89b56778efc4ae345d1a5211bf2de1ff2d9c95e770d366d6e0ec1d5af681a657bc0084f59cd945f51405625d1b5dda85b0e10f7c0148cf6b722434601c1e1

        • \Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          187KB

          MD5

          4aca0865c5088997fe6aecdcc1883807

          SHA1

          da326c6f05cfb9d0125455c450349f041704d968

          SHA256

          2e096cddccb62fd2a6232ab592dd1a87318537296e07ff776f3b34521618d986

          SHA512

          eb0e471e940c1ee718905b01441c4bf12b2a5a342c3974afbd1cf45b93636ef23a44726ad90b892ba1b710810e4ff4f8cbf56dc1a27f10538db06572a35f1e15

        • \Users\Admin\AppData\Roaming\SubDir\winsock.exe
          Filesize

          34KB

          MD5

          b089f35e6db5e890904b55119cbe1258

          SHA1

          8816525387a6bc7273732cb174e098803cacaa9e

          SHA256

          ed4cfff765fdc77bca7d64e1c09f6d065c6016eb375d24d158c57264e2404286

          SHA512

          8071305ae7a971f913beb91530f4bee1b128ade20e5f8184490ea182e082a9decb2c561f3fafba4554929b61808d7aef530df5dc8082f282ae70e1535c1066b7

        • memory/784-77-0x00000000745D0000-0x0000000074CBE000-memory.dmp
          Filesize

          6.9MB

        • memory/784-78-0x0000000004A50000-0x0000000004A90000-memory.dmp
          Filesize

          256KB

        • memory/784-79-0x00000000745D0000-0x0000000074CBE000-memory.dmp
          Filesize

          6.9MB

        • memory/1756-36-0x0000000000FF0000-0x000000000104E000-memory.dmp
          Filesize

          376KB

        • memory/1756-58-0x00000000745D0000-0x0000000074CBE000-memory.dmp
          Filesize

          6.9MB

        • memory/1756-47-0x0000000000B40000-0x0000000000B80000-memory.dmp
          Filesize

          256KB

        • memory/1756-45-0x00000000745D0000-0x0000000074CBE000-memory.dmp
          Filesize

          6.9MB

        • memory/2264-60-0x00000000745D0000-0x0000000074CBE000-memory.dmp
          Filesize

          6.9MB

        • memory/2264-61-0x0000000004840000-0x0000000004880000-memory.dmp
          Filesize

          256KB

        • memory/2264-55-0x0000000000A10000-0x0000000000A6E000-memory.dmp
          Filesize

          376KB

        • memory/2264-56-0x00000000745D0000-0x0000000074CBE000-memory.dmp
          Filesize

          6.9MB

        • memory/2264-57-0x0000000004840000-0x0000000004880000-memory.dmp
          Filesize

          256KB

        • memory/2316-29-0x00000000008C0000-0x00000000008C1000-memory.dmp
          Filesize

          4KB

        • memory/2676-40-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
          Filesize

          4KB

        • memory/2676-33-0x0000000000080000-0x00000000000A0000-memory.dmp
          Filesize

          128KB

        • memory/2676-31-0x0000000000080000-0x00000000000A0000-memory.dmp
          Filesize

          128KB