Analysis
-
max time kernel
4s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 00:07
Behavioral task
behavioral1
Sample
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe
Resource
win10v2004-20240611-en
General
-
Target
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe
-
Size
2.0MB
-
MD5
769ded1ba7b202918ff301a726156481
-
SHA1
a21c5a68bb2c9e8a89dafa1bad6fda99d3196ba4
-
SHA256
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4
-
SHA512
9644f639c322fb1a3d5b78ebcd1e1c8fab39e3313aceca713d25aae331cc54d178e26144c52b0e19a7c83053f2fb48fd3ed1459358cf257a5de87819db18f4b4
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYk:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yi
Malware Config
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Extracted
azorult
http://0x21.in:8000/_az/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 5 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\windef.exe family_quasar behavioral1/memory/2616-54-0x0000000000D50000-0x0000000000DAE000-memory.dmp family_quasar behavioral1/memory/2852-64-0x0000000000B50000-0x0000000000BAE000-memory.dmp family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar behavioral1/memory/2976-99-0x0000000000880000-0x00000000008DE000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
Processes:
vnc.exewindef.exepid process 3024 vnc.exe 2616 windef.exe -
Loads dropped DLL 8 IoCs
Processes:
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exepid process 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exedescription ioc process File opened (read-only) \??\p: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\r: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\t: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\x: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\b: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\n: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\q: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\v: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\y: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\a: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\o: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\s: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\u: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\z: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\h: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\g: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\i: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\j: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\k: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\l: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\m: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\w: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe File opened (read-only) \??\e: 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exevnc.exedescription pid process target process PID 2392 set thread context of 2628 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe PID 3024 set thread context of 3040 3024 vnc.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3068 2852 WerFault.exe winsock.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1948 schtasks.exe 2260 schtasks.exe 2748 schtasks.exe 2684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exepid process 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
vnc.exepid process 3024 vnc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exevnc.exedescription pid process target process PID 2392 wrote to memory of 3024 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe vnc.exe PID 2392 wrote to memory of 3024 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe vnc.exe PID 2392 wrote to memory of 3024 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe vnc.exe PID 2392 wrote to memory of 3024 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe vnc.exe PID 3024 wrote to memory of 3040 3024 vnc.exe svchost.exe PID 3024 wrote to memory of 3040 3024 vnc.exe svchost.exe PID 3024 wrote to memory of 3040 3024 vnc.exe svchost.exe PID 3024 wrote to memory of 3040 3024 vnc.exe svchost.exe PID 2392 wrote to memory of 2616 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe windef.exe PID 2392 wrote to memory of 2616 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe windef.exe PID 2392 wrote to memory of 2616 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe windef.exe PID 2392 wrote to memory of 2616 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe windef.exe PID 3024 wrote to memory of 3040 3024 vnc.exe svchost.exe PID 2392 wrote to memory of 2628 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe PID 2392 wrote to memory of 2628 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe PID 2392 wrote to memory of 2628 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe PID 2392 wrote to memory of 2628 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe PID 2392 wrote to memory of 2628 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe PID 2392 wrote to memory of 2628 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe PID 2392 wrote to memory of 2748 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe schtasks.exe PID 2392 wrote to memory of 2748 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe schtasks.exe PID 2392 wrote to memory of 2748 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe schtasks.exe PID 2392 wrote to memory of 2748 2392 8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe schtasks.exe PID 3024 wrote to memory of 3040 3024 vnc.exe svchost.exe PID 3024 wrote to memory of 3040 3024 vnc.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe"C:\Users\Admin\AppData\Local\Temp\8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵
- Maps connected drives based on registry
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2684 -
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:2852
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\0IKYcAp87Tey.bat" "4⤵PID:884
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:1524
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:1708 -
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 15324⤵
- Program crash
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe"C:\Users\Admin\AppData\Local\Temp\8d4959256e53fb74a296edbd63a8287d142b99804dcfa5e64c991a86c7e440d4.exe"2⤵PID:2628
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2748
-
C:\Windows\system32\taskeng.exetaskeng.exe {B44E0C9E-EBE4-4C22-AFFD-22595C3ACD80} S-1-5-21-39690363-730359138-1046745555-1000:EILATWEW\Admin:Interactive:[1]1⤵PID:1812
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe2⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"3⤵PID:300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k4⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"3⤵PID:2976
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"3⤵PID:1272
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD533de9fad6d7040e8239fff1ca419fa3d
SHA19fa8e4ae7b34079bbd28222706ced31e3513bd02
SHA2568bb84c592b51c6540f50e3d8b848748c989375f737c2fbcbba2a9f0f27528804
SHA512a92db98a3615591af47dcd97b398485d6966b8ceed0b4a8d50ac350751db6b80accdd1d3b189c10f0af0ced813cf1dca333fa7321310d82b7c41de0ae3f22c45
-
Filesize
211B
MD52b1d43d75878d59d7da25ee20a512b55
SHA1ccf1304b06a7119f3c2363b6a4f0bce5568d13d4
SHA256ac796099ee24713a7f3c20961ee552f2fa1098245e213a7109d36a2bf85fe21c
SHA512ef2aacc74e18bb8e96015bcdd594b68fcdc602f7f5980d7d88284c106f19ee12c5d0af31fa2084ea31959745802b769d103c35083914f375d76a5b53ebb89a72
-
Filesize
2.0MB
MD5ffacfd12723631bcf6ab667b5c172b1c
SHA1d7aadcd33613fb2fabf95c8d435d8b184b092a7d
SHA2561ef443f303fb584ed97a3454c91d331302fd9b31dc9d92d7f9c2bfcbbf4aa86d
SHA5125aca74523251205d0c89147ad4d7988a6fbaf260b62d848a860c1f4c4657bf37bf5db6857a72f2f7ef4a0848724e08a8d0e6a2bc637eaa292492feab6baa0c6d
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb