Analysis
-
max time kernel
11s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2023 01:35
Behavioral task
behavioral1
Sample
Adobe Download Manager.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Adobe Download Manager.exe
Resource
win10v2004-20231215-en
General
-
Target
Adobe Download Manager.exe
-
Size
2.0MB
-
MD5
c04ab7d36b2e6e8175fe2e0fa8dccf14
-
SHA1
6516b7e30fc92ced182230288726e517251db430
-
SHA256
bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413
-
SHA512
c3bc065567b5d302c62c83a67426e465a7000aca9a99d3169c488d54ed9824972e327846109af12314d25ab10180c370468c63b11eb05aac1b3bed7d2110d753
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYP:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YB
Malware Config
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Extracted
azorult
http://0x21.in:8000/_az/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 14 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar behavioral2/memory/3820-29-0x0000000000EF0000-0x0000000000F4E000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Adobe Download Manager.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation Adobe Download Manager.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4548 3124 WerFault.exe winsock.exe 4064 5012 WerFault.exe winsock.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2616 schtasks.exe 3068 schtasks.exe 5056 schtasks.exe 884 schtasks.exe 348 schtasks.exe 3308 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Adobe Download Manager.exepid process 936 Adobe Download Manager.exe 936 Adobe Download Manager.exe 936 Adobe Download Manager.exe 936 Adobe Download Manager.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:2068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"2⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:3820
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:5056
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:3124
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2GnaZlEXSNRK.bat" "4⤵PID:1324
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:2376
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:4932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 20044⤵
- Program crash
PID:4548
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3068
-
-
C:\Windows\SysWOW64\chcp.comchcp 650011⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3124 -ip 31241⤵PID:4420
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:4568
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3308
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:5012
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Su4aUEOKt5zQ.bat" "4⤵PID:568
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:2088
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:4684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 23124⤵
- Program crash
PID:4064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:568
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵PID:4824
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:348
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k1⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5012 -ip 50121⤵PID:4236
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2396
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
208B
MD518dc3eec49c6f28199520ed66ad4aef1
SHA139e33ec473436a34d08c36511c62445204da3ff4
SHA256855510131737ff8a8e4fb41946d8ca0423395f035ac5050229619f8397e0a9fa
SHA5120b10c27124a68fca9f811d598e2f48c9fcf618d81fa2178a4d706fb486145fc9cfdb783ee45400e45fe055a24ad08efda8ab3476c2a5213b13999b087431ccb1
-
Filesize
208B
MD5b9af2e091be9a75f6118521993bd7ea2
SHA11d09f5b683a19dd23714b7a89e019a237ef5eaa8
SHA256eba6a3fee21eb1865e38742a1dd61c3bdd79bbacbe18dc8fd6aa263267eb7440
SHA51289a856d0e64e463fec2e6e6e24af2a8b9d324be98e56f7333cfe00634cf00b19af87c77ac1247593fa5a2afe29ba91968ac77b35ed9bb52983e9a80c5e18c4ed
-
Filesize
176KB
MD5fd732f6505118c2c91b2e678ba15e9b2
SHA1ce9af5a4551e2cbc420edf8ef3f554c5ba63abb4
SHA25672c7928f827193d723b090841b015f55d1a8c9b10b222be544b032306a16ad37
SHA512dc87171a23940cb37671b9e3903795c9af19ba5917b710464d75561b297632c471672d3258cedf8429ffa4acc3794b42241469c13cf6ebc0c087c0d5e4aeb8ec
-
Filesize
69KB
MD52eb3a57548f19b0326e1581e75cc56a2
SHA1ed2a93369d36df19826718c37a0ff8d008a2932b
SHA25652a21aabb6c517259adf75ad943c7abb0e12c4827b1f02f3bd697456327d68f6
SHA512e3e0d0e8cc52f794ef7f1ffa98a23a29c2c0224c1044878ea26475935439f6c0fedcabb36717a23ef2afecb4c1ae31c22d2fcbe0e93e3d10543aaa1b3847fb78
-
Filesize
102KB
MD58cac212a9dc723fea81f035dbb174147
SHA1266967508a0cbb1c67e839d086d149e001edbcf5
SHA256d83c2ae1af4763f26cf0e90c99fa93f8bbfc91f8608815f6011128abf79af29a
SHA5120f4a7249925465fb375404efae6ddd3ab1d8e8e4507e0d386181b01c00218924e381756afd401ce007a78bc81423e57b8979bcc288c1a422bc4ec136dfd2a8a5
-
Filesize
59KB
MD5de6fd2d0709a0e8bf7d53c62ef9b0827
SHA10fbbf1cb0fe3f44d6f2d24d2cb63e3d01f6fab65
SHA256237e528affdc5dcf9eb36bfbb5ce76bb3182515d1058990b223eb5e0a03dde12
SHA5123c5ce7e19b7b438d144c072426ca9b63586290024ca761af8241ef372562fe2589ceb2223fc3f491ff71669144c29435b58141ff5c5a186a064a5814606c113a
-
Filesize
178KB
MD5b382c148e18e6fcc7ea9996f32a34558
SHA101a527a954f0c9ca5518897530af12f6564ac333
SHA256a1137680226dad2df9f6cddb3145c077de32e09561fb1ad63b0cee8fdf2fe3ef
SHA5120d74aff9f73777caa6a6c17db600d1b61c3edac5d8e315a40612b26e1b062bc2f5908fc4dd4855a92dab7075299efc8f4da750a47747f37297e11b31078b3073
-
Filesize
29KB
MD5f186489bc10e37fccee84eaa0e06144b
SHA14b351b6d85a569f44c097e1bb5fc66823b41ebef
SHA256d361a5360622c1675803149a2e69ff1bbdaebdc402d639cbf5ae423b8533a23d
SHA51294266314550862b423ff6ccee576eb351dac5aca41a8964244fc9ffcd85c8450cda896a78d824eb484ba90ce13584871eecdaf61a328ad195c4ea42e2ff5399d
-
Filesize
149KB
MD53b2b3831fc57a0c03d80fee6c3fd5032
SHA159f848cd64e1faba7b6a867d7272306c041147ec
SHA256a9218930d9a9587a133b44776dc479560b3a1f147d648e78defce5618bd1952a
SHA512aaa71431b94871124d44bbc60eed2efc9151b1ad8f553842e4142ad72f36f66b3403c14550dc345277da9b4a9f78e1fa7ed713dba1caffdeca885faa90246917
-
Filesize
125KB
MD589c23c98cb746254c7bb4db49dc9bfb9
SHA15e0b58cc535c1083a4140432da8b1475bc0bacdc
SHA2561fe281e75984e1a0ef2e4f969e446c3e40295a5d87238d5ef87d796233287b45
SHA512be81bd6d4c4836112c461336dd3ac8e9fdd12c35d552d18cf9c34cba76566a6460e9ca9e9f07136e7326ab5d2555d85de69e1af651bfea0b8a682da368371deb
-
Filesize
53KB
MD5e10e976d5129e1c118d56205ba3f900a
SHA182a37255def6b5ecede59e9347393adba81a5e34
SHA2562898a55df71d20dcebeab6d4ae06b6ab189f180bee11d7316a93aa9b6654fd1f
SHA512ef69797a0ef95b65e6ad8ad09cf0ad45544f4ecdb94c3dcea2de45322bebe9371965ebb997f3c3ccca359f313baa5dbe59be263d0f3328b10544ab26e35de9e2
-
Filesize
224B
MD5c1163279ede01afde527f34d8055f80c
SHA1c4573669f01c58620eb240ab4416d4a853b7a56e
SHA25606e93a990672ed6ae6813507d3719f3683b6ba3993af06796ec3b5a650c17efd
SHA5124d1a56f65fc762d8c82a25c7531d04c399686ad1b8c87ed8cb018812c7ce5d8d87b9747b068cbd8658e54b700cd40dc0f3bcab7e7c84da8d61db831c767fe111
-
Filesize
102KB
MD5f43de2338b5fb48a861a70ae794b396b
SHA1716a3e20e49cc536df82583c415b370809b4adcc
SHA2561284a15399400078cf6a81d4fda57d3577146a2de4a86cada7abdbb6ef1066d6
SHA512cde643bbccd2e51dbee55acf4f29ea809d242097756b82d2acf28e53c5f90de0be1a9d21ceb778b5b7946c907c56743a21465058ba9bcd60b37298dc2aa00ac5
-
Filesize
39KB
MD529e60b96c536c82d895a13aeb068f7d3
SHA1a4f59360eb9577c451673174660236ea8f79aed4
SHA2568d9a1ce29c74fa9cd98d085c7a1bfebc10454fbf2e2d94264a426a1dbdd38fe6
SHA5123a14c57080eaca45abb746c8adef85751b5c1b7ec61fbb77e8de81770ce42b067bf6afdb90b40934c87007530c488f69b2f0e83d3d7916f8888200a4b7b2bbd8
-
Filesize
17KB
MD5aeb7d697187b14aa6865eff4abc40797
SHA1e390dd44e0dead22e558f2173b99ab480705f47f
SHA25656f04af163b41e49d7a58482d5e35e4f9f77d501549f11fc005291b9cb216d78
SHA51296215f1af441a985cb52e2160d3c1cfdead1cc8dbfa8e38fc9d78cff44171052de42447880a3d2982d2fc58fc0150fd530d527b96e4bccb5f5b66618f327b4fa
-
Filesize
57KB
MD5a0cf3019665fa4b90512c5adfeb5d727
SHA197a90b1a4935210e90ddc925eb37f03e862b004c
SHA25682be070a13f8b86b61094243559a36db9b661722d75ec08d3091ecab42428c07
SHA51215b21970ca0dacc54df6063447db4f18aa988eb655fece3ec4d7584e94d2f5640abedd2483f21160ae98f13132970a3226ffe4a53ffdf2ca277c8a3e6a14f8ca
-
Filesize
87KB
MD55dbde52b7722de3381936b65ce74e0a8
SHA190c7551a17ad953ee24158e955e709411f89084e
SHA25636fce72fc3b0aef80af851462d2fd7d040de4b549d43f080bef8ce7dc644b67e
SHA5127974cbac8c24d0ead4d2879556e99209fbcbe283c9200bae1856f595b4b1c8d248a019f3e17908ca606699cfadf9c7d196d668049ba6800ec7863852ad159a4c
-
Filesize
94KB
MD5511f68f93911fe72160ac9fb0878e451
SHA199e851c81975cff80a62d06b1bd59a78a6dd946a
SHA256029dd620ff8e3550d1868caff83e1ac6ec0b6dc2c602c8998d13532c6b61a5d1
SHA51202a91143235f54bc570e425ba37cf7aaac008c9a3cf9840bf20e3b903fe772482f9cafd974e07921a467a1eeb3b3c046df5240077f0313f8ae79f00003e4a3ad
-
Filesize
100KB
MD57aca40d680af3552e595fcdd1a10f048
SHA1abec03c0f0e9716967c4b6088e7e1441c09457e4
SHA25665cbe2abb7a0827cdcdc95fd3bf8ac84b078bed843c3648732763481782794fc
SHA512c8ad2c5df009796c527d84f528aaef16cc3d1b031c29c30ef4cb7e46b84535405fa3d4c8e11d4e9569cb766ac40422c24c1ce7f3e0760983680e01ad0550062c
-
Filesize
87KB
MD53ebfb097d3ff492427c06522b5d5465e
SHA1dd2fce8d02980571edbe0f47db0e7f2ab737b744
SHA2560c5723cf25ac0c2827e99c8bda7a8818e101fdfc1a8d452caa3003828391699e
SHA512d2f9876ebe4747708c287d583e730269153bb331f19c5297e17025a811093fd2c4d1841212ed1dbf7dae4ed2f9c691b05eae1a664ad10ea45513723c00c56036