Analysis
-
max time kernel
7s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 01:59
Behavioral task
behavioral1
Sample
bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe
Resource
win10v2004-20231215-en
General
-
Target
bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe
-
Size
2.0MB
-
MD5
c04ab7d36b2e6e8175fe2e0fa8dccf14
-
SHA1
6516b7e30fc92ced182230288726e517251db430
-
SHA256
bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413
-
SHA512
c3bc065567b5d302c62c83a67426e465a7000aca9a99d3169c488d54ed9824972e327846109af12314d25ab10180c370468c63b11eb05aac1b3bed7d2110d753
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYP:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YB
Malware Config
Extracted
azorult
http://0x21.in:8000/_az/
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1712-25-0x0000000000880000-0x00000000008DE000-memory.dmp family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 40 ip-api.com -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1476 4112 WerFault.exe winsock.exe 2672 5080 WerFault.exe winsock.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1172 schtasks.exe 2184 schtasks.exe 5084 schtasks.exe 2020 schtasks.exe 4516 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exepid process 1820 bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe 1820 bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe 1820 bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe 1820 bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe"C:\Users\Admin\AppData\Local\Temp\bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵
-
C:\Users\Admin\AppData\Local\Temp\bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe"C:\Users\Admin\AppData\Local\Temp\bc2075cbfaa127a6a3f684bb42bae6f11861258630e37422ebd832d2f2b40413.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 20004⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NQJ8rkQffC6v.bat" "4⤵
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 17686⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qjeeAv7MPrvg.bat" "6⤵
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k1⤵
-
C:\Windows\SysWOW64\chcp.comchcp 650011⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost1⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4112 -ip 41121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5080 -ip 50801⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost1⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\chcp.comchcp 650011⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windef.exe.logFilesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
C:\Users\Admin\AppData\Local\Temp\NQJ8rkQffC6v.batFilesize
208B
MD50f9408ed7611a375cef4f381cffb6a37
SHA151737de4826083b05ef5295047e189d1d6a863dd
SHA25674107ba1bf46f8f466f67cbeb1aa43d0f394f051fb4dda44c2e62b7f15183437
SHA512d705b0d0db2afe83bed6fd0c9f3d02b41d469dd494beb2a8c829a5327d6057a0a8a03509fcfe8401891d146483bed50a84694e519fc5bbaedef11cc4ff7d7d95
-
C:\Users\Admin\AppData\Local\Temp\qjeeAv7MPrvg.batFilesize
208B
MD52aa63110d56e273b6a3cc8102ca0f22f
SHA1162c3919cb85faf1b867cdfc011703e256cea237
SHA25625e9ddc22f52b4be5aa927348eb3bd0a4c7b0d9c685c789b191cf6b711d496b6
SHA5120ef2314031efabdfdbebbfa5d335171eb2d097aa222f9f6dbe293ec4e701dd88cd738346d05326eaa73d805c0c4b124c886745737e7a46ee9b3ef50963798c35
-
C:\Users\Admin\AppData\Local\Temp\vnc.exeFilesize
17KB
MD5acc00fd13b9691465acddc2cddd9015b
SHA1dea73bd2f6b51b37d88268fbec24ba7d216da50c
SHA2567698306ee38405a2ce63d179bb856be470dad12e4ecb1eb3f11ba5944679fc9f
SHA512ccc43c91c6b2df962026e685d104060d6732a64fab227a5de1d579f88651d73e57ca3db9d052dfaed3a48333ffff0c2eaf855de9d388ae258ce5b76bedc26cc6
-
C:\Users\Admin\AppData\Local\Temp\vnc.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\vnc.exeFilesize
48KB
MD56355d6a666016bfa161f599bf075a57e
SHA1b2f080a0ff4637de79ddc93e4525411997873433
SHA256dafedda21bf68f2c341e44c4e9f912b14577ea3da9b262c9afac066fb1b0e4eb
SHA5126e33375b0a8e2a8b1b67a0a4075ba249645e166051ab75d60ef66a5828dfbd4aeea611fc2fdad7afe7dc86d61b592a4d5613d02a652d6ec4dc3e89750ba270e5
-
C:\Users\Admin\AppData\Local\Temp\windef.exeFilesize
13KB
MD560d84b842ce6338fe29b160bf90a3892
SHA1a6b51ed138a450ea798af1f1b74e54c35c8633a2
SHA256c919fdbe66f14656e9dc7407c8a33b75f0d2b6aba3706582bd415947921066e4
SHA5129eb63ffc7dbd878123200986ab699451bbcd91cbb49ea62d38153c00036270a7993b4a52b93a1ea0c90fbc232c16b460676fc6f74390e24580e0a67329de6dd5
-
C:\Users\Admin\AppData\Local\Temp\windef.exeFilesize
80KB
MD591094f43d4ba30185108200d1784e34a
SHA14df11b82bd823ac3fe199b63a6d9d7f9618d236f
SHA2561676aaace8e44f8ead3d5a17cda9ab366d301eb9a2fba8b65e8d15464847039f
SHA512a43536bf6242bbd435700235c4015f434144107ca0797aed1079d39152b0639f71705cf94c73552be5d4a250a6ef9b56d702dfad28ed9a178dec55bfbf5b55e1
-
C:\Users\Admin\AppData\Local\Temp\windef.exeFilesize
57KB
MD5b11c341bcaa71ece19a534dd318186e7
SHA1e21b0804febb8a2fe526cea33d701f7bce078612
SHA256b34f27c82d8ac76c30f7340fb6d728c5c3817a3e86365cfd45434aa0da1e0f76
SHA5129512d6d8e552f18ed8c72ef935f1446742eb722f5cec15c8a278212646d2089cceba484d3454c6ac60172f0b1761b7b2dc2dbe2948bc750e200a28de71620505
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exeFilesize
13KB
MD5b48f00929e4efdf342dead5839448df4
SHA16671026eea7085cd1389648eee9d922ca2a8e11a
SHA256c28fd413ca59737e18d14b0a829e88421323cfdd09fb70cdd6931eca5b317a60
SHA512d1ebc96dc994e91ce1f400ebe67490b95f6aeefcb6ca19de0b3dd7f7d868735b599d1ef10f7d761a35ccc021aee261a0d3de0e194703144b05ab345a4c55631f
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeFilesize
16KB
MD5ec6092eb8883ee18cb7fe02837f9fa58
SHA17702f02399496b0956f998436a3f5c84f03a0939
SHA2566c0dbb1629d39557c78cfb8260365abbeef0c81c5abba2e28e5c2cc4501b64ad
SHA5120580baf4d8c12890e7228c0db8878fb0dc53ba6033c92745c526d6a88e4a3ca0229b46d3ca2e703a60fef2795f50e83a46861cd5c73ad1fabcefce1b91f40dce
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeFilesize
25KB
MD586da8b38f3ae887e7f78ca25488f26de
SHA128c411cd582db041ba2545233e8f112cbf0faf0d
SHA256ec56a4eec94d2fe53fe9728ffe626b8b9a5d00c75fe2bb769768b9bab89bdd1d
SHA5128d3c190d1652a498b2d4fa90d7cb059c4dc1e053dcdbea93f6b1bf58b86d6f5e7fac381c2ef2399a873b5abb1d0c321da97da9a0bea7b62d1b1fb52c6d821082
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeFilesize
6KB
MD59d37b539938f2a1bc648b49270630a3f
SHA16a591c25832632fe9e822b3a663fbc64c7d8dc0f
SHA2566a462f8a211101e1e79fba293c07ca364e7a781982faca4ca9a343d38049ed3b
SHA512937aace4fda6760cd378dadcfa785e1cd19abfa77a5e776d827fa31ad135d1917a7c7693b7c5f0f31720e8b691b1368c3a8e830257f8a546881fd50315ed5dfa
-
memory/1340-88-0x00000000005A0000-0x000000000063C000-memory.dmpFilesize
624KB
-
memory/1340-107-0x00000000005A0000-0x000000000063C000-memory.dmpFilesize
624KB
-
memory/1340-82-0x00000000005A0000-0x000000000063C000-memory.dmpFilesize
624KB
-
memory/1340-84-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/1620-79-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/1620-100-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/1620-80-0x0000000005240000-0x0000000005250000-memory.dmpFilesize
64KB
-
memory/1712-42-0x0000000005190000-0x00000000051A0000-memory.dmpFilesize
64KB
-
memory/1712-23-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/1712-53-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/1712-25-0x0000000000880000-0x00000000008DE000-memory.dmpFilesize
376KB
-
memory/1712-34-0x0000000005780000-0x0000000005D24000-memory.dmpFilesize
5.6MB
-
memory/1712-45-0x0000000006750000-0x000000000678C000-memory.dmpFilesize
240KB
-
memory/1712-44-0x0000000005750000-0x0000000005762000-memory.dmpFilesize
72KB
-
memory/1712-43-0x00000000051D0000-0x0000000005236000-memory.dmpFilesize
408KB
-
memory/1712-41-0x0000000005270000-0x0000000005302000-memory.dmpFilesize
584KB
-
memory/1820-18-0x0000000004490000-0x0000000004491000-memory.dmpFilesize
4KB
-
memory/3916-37-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3916-20-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4112-52-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/4112-83-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/4112-54-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/4112-56-0x00000000064B0000-0x00000000064BA000-memory.dmpFilesize
40KB
-
memory/4112-90-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/4112-105-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/4588-29-0x0000000000980000-0x0000000000A1C000-memory.dmpFilesize
624KB
-
memory/4588-77-0x0000000000980000-0x0000000000A1C000-memory.dmpFilesize
624KB
-
memory/4588-30-0x0000000000A20000-0x0000000000A21000-memory.dmpFilesize
4KB
-
memory/4588-38-0x0000000000980000-0x0000000000A1C000-memory.dmpFilesize
624KB
-
memory/4868-99-0x0000000000FB0000-0x0000000000FD0000-memory.dmpFilesize
128KB
-
memory/4868-89-0x0000000000FB0000-0x0000000000FD0000-memory.dmpFilesize
128KB
-
memory/5080-108-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/5080-109-0x00000000056F0000-0x0000000005700000-memory.dmpFilesize
64KB
-
memory/5080-112-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB
-
memory/5080-113-0x00000000056F0000-0x0000000005700000-memory.dmpFilesize
64KB
-
memory/5080-118-0x0000000073450000-0x0000000073C00000-memory.dmpFilesize
7.7MB