Analysis

  • max time kernel
    1s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 23:49

General

  • Target

    85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe

  • Size

    2.0MB

  • MD5

    25e263626ad1a0726f6690ba1cbe4062

  • SHA1

    1beb75e2172b35d43ad73e742a93ca57e7270cb2

  • SHA256

    85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7

  • SHA512

    369906b901856337d3b3cbc72c0852d280e0c2c542c889fbb2086befeb86c98f16161f529c25cccc5d03485bedd47c80897b748dd712ef6a8577c15084eb9180

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYg:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YO

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe
    "C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
      • Executes dropped EXE
      PID:1244
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
          PID:2676
      • C:\Users\Admin\AppData\Local\Temp\windef.exe
        "C:\Users\Admin\AppData\Local\Temp\windef.exe"
        2⤵
          PID:2156
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
            3⤵
            • Scheduled Task/Job: Scheduled Task
            PID:852
          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
            "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
            3⤵
              PID:1840
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                4⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1992
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\pNaxvzTGE9Gh.bat" "
                4⤵
                  PID:2904
                  • C:\Windows\SysWOW64\chcp.com
                    chcp 65001
                    5⤵
                      PID:1084
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 10 localhost
                      5⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:320
                    • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                      "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                      5⤵
                        PID:1204
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 1400
                      4⤵
                      • Program crash
                      PID:2912
                • C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe
                  "C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe"
                  2⤵
                    PID:2908
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                    2⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2696
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {2EC70738-7186-4335-982C-9B1E5A3C6BC1} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]
                  1⤵
                    PID:768
                    • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                      C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                      2⤵
                        PID:988
                        • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                          "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                          3⤵
                            PID:872
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k
                              4⤵
                                PID:1920
                            • C:\Users\Admin\AppData\Local\Temp\windef.exe
                              "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                              3⤵
                                PID:2220
                              • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"
                                3⤵
                                  PID:1272
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                                  3⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:3020

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\pNaxvzTGE9Gh.bat

                              Filesize

                              208B

                              MD5

                              f1f92229079f4b819e9a21e7f8c297b7

                              SHA1

                              d3d18506bd3d5a4a53030e4a70cb585727763b67

                              SHA256

                              6732ac93a8038a6f216071b0083252aef23d396ddd143e0d233ad92ac74f0acc

                              SHA512

                              3c084609b3f33815263accde387765b69422aef9e356a023dd62bfd42745420b89597dd56fa1f44e4e67d08a445f00daa7be39cae6f7514168dfc69b184d56c6

                            • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                              Filesize

                              405KB

                              MD5

                              b8ba87ee4c3fc085a2fed0d839aadce1

                              SHA1

                              b3a2e3256406330e8b1779199bb2b9865122d766

                              SHA256

                              4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                              SHA512

                              7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

                            • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\AA7LB818.txt

                              Filesize

                              209B

                              MD5

                              e22702e4a13109f88323d77375530968

                              SHA1

                              93dc27d8e718fb656899bb64781e8046d99d297a

                              SHA256

                              90f7f0427fbee81b290d3b75d929c63598bb87bb45594c93463ad4b007e68e35

                              SHA512

                              6eca3e033329af0fd9431c10150b70a8a34202b1937d134f3da31b04f9677c3c8566757a56c9c9d71d74119d8bdb4a689f2ee2169ac070525fb8bfe24be28700

                            • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe

                              Filesize

                              2.0MB

                              MD5

                              8e2f52fd526de71deb1f7660a649cc4c

                              SHA1

                              e22fdc0e86cc1d1c5a3b8c55012a1f5cf367b095

                              SHA256

                              a43ace7477978d67112bae448e43d73c9e16b72604c664ea8ffabc2b313808eb

                              SHA512

                              e210bd2780a445576deedecabb4e8ec5795631d62db8f9478a2d8902266376c017e16b33e274f3a6e6097197ebd96c9b042aa15946432d19ff540d7d84012fd0

                            • \Users\Admin\AppData\Local\Temp\windef.exe

                              Filesize

                              349KB

                              MD5

                              b4a202e03d4135484d0e730173abcc72

                              SHA1

                              01b30014545ea526c15a60931d676f9392ea0c70

                              SHA256

                              7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                              SHA512

                              632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

                            • memory/1272-129-0x0000000000080000-0x00000000000A0000-memory.dmp

                              Filesize

                              128KB

                            • memory/1272-122-0x0000000000080000-0x00000000000A0000-memory.dmp

                              Filesize

                              128KB

                            • memory/1272-125-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/1840-63-0x0000000000C50000-0x0000000000CAE000-memory.dmp

                              Filesize

                              376KB

                            • memory/1920-114-0x00000000003A0000-0x000000000043C000-memory.dmp

                              Filesize

                              624KB

                            • memory/1920-106-0x000007FFFFFD6000-0x000007FFFFFD7000-memory.dmp

                              Filesize

                              4KB

                            • memory/1920-119-0x00000000003A0000-0x000000000043C000-memory.dmp

                              Filesize

                              624KB

                            • memory/2120-30-0x0000000000C50000-0x0000000000C51000-memory.dmp

                              Filesize

                              4KB

                            • memory/2156-53-0x0000000000D40000-0x0000000000D9E000-memory.dmp

                              Filesize

                              376KB

                            • memory/2220-131-0x0000000000B30000-0x0000000000B8E000-memory.dmp

                              Filesize

                              376KB

                            • memory/2676-45-0x000007FFFFFDD000-0x000007FFFFFDE000-memory.dmp

                              Filesize

                              4KB

                            • memory/2676-50-0x00000000003C0000-0x000000000045C000-memory.dmp

                              Filesize

                              624KB

                            • memory/2676-46-0x00000000003C0000-0x000000000045C000-memory.dmp

                              Filesize

                              624KB

                            • memory/2676-43-0x0000000000020000-0x0000000000021000-memory.dmp

                              Filesize

                              4KB

                            • memory/2908-38-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2908-42-0x00000000004C0000-0x00000000004E0000-memory.dmp

                              Filesize

                              128KB

                            • memory/2908-31-0x00000000004C0000-0x00000000004E0000-memory.dmp

                              Filesize

                              128KB

                            • memory/2908-32-0x00000000004C0000-0x00000000004E0000-memory.dmp

                              Filesize

                              128KB