Analysis
-
max time kernel
1s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 23:49
Behavioral task
behavioral1
Sample
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe
Resource
win10v2004-20240709-en
General
-
Target
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe
-
Size
2.0MB
-
MD5
25e263626ad1a0726f6690ba1cbe4062
-
SHA1
1beb75e2172b35d43ad73e742a93ca57e7270cb2
-
SHA256
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7
-
SHA512
369906b901856337d3b3cbc72c0852d280e0c2c542c889fbb2086befeb86c98f16161f529c25cccc5d03485bedd47c80897b748dd712ef6a8577c15084eb9180
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYg:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YO
Malware Config
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Extracted
azorult
http://0x21.in:8000/_az/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 5 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\windef.exe family_quasar behavioral1/memory/2156-53-0x0000000000D40000-0x0000000000D9E000-memory.dmp family_quasar behavioral1/memory/1840-63-0x0000000000C50000-0x0000000000CAE000-memory.dmp family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar behavioral1/memory/2220-131-0x0000000000B30000-0x0000000000B8E000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
Processes:
vnc.exepid process 1244 vnc.exe -
Loads dropped DLL 4 IoCs
Processes:
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exepid process 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2912 1840 WerFault.exe winsock.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 3020 schtasks.exe 2696 schtasks.exe 852 schtasks.exe 1992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exepid process 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exedescription pid process target process PID 2120 wrote to memory of 1244 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe vnc.exe PID 2120 wrote to memory of 1244 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe vnc.exe PID 2120 wrote to memory of 1244 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe vnc.exe PID 2120 wrote to memory of 1244 2120 85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe vnc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe"C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
PID:1244 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:2156
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:852 -
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:1840
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pNaxvzTGE9Gh.bat" "4⤵PID:2904
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:1084
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:320 -
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 14004⤵
- Program crash
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe"C:\Users\Admin\AppData\Local\Temp\85d23222e9042184e341ffbc90bd3909a4551331cc5fb02da1db37c7e98e7ac7.exe"2⤵PID:2908
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\taskeng.exetaskeng.exe {2EC70738-7186-4335-982C-9B1E5A3C6BC1} S-1-5-21-2212144002-1172735686-1556890956-1000:MVFYZPLM\Admin:Interactive:[1]1⤵PID:768
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe2⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"3⤵PID:872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k4⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"3⤵PID:2220
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"3⤵PID:1272
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD5f1f92229079f4b819e9a21e7f8c297b7
SHA1d3d18506bd3d5a4a53030e4a70cb585727763b67
SHA2566732ac93a8038a6f216071b0083252aef23d396ddd143e0d233ad92ac74f0acc
SHA5123c084609b3f33815263accde387765b69422aef9e356a023dd62bfd42745420b89597dd56fa1f44e4e67d08a445f00daa7be39cae6f7514168dfc69b184d56c6
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
209B
MD5e22702e4a13109f88323d77375530968
SHA193dc27d8e718fb656899bb64781e8046d99d297a
SHA25690f7f0427fbee81b290d3b75d929c63598bb87bb45594c93463ad4b007e68e35
SHA5126eca3e033329af0fd9431c10150b70a8a34202b1937d134f3da31b04f9677c3c8566757a56c9c9d71d74119d8bdb4a689f2ee2169ac070525fb8bfe24be28700
-
Filesize
2.0MB
MD58e2f52fd526de71deb1f7660a649cc4c
SHA1e22fdc0e86cc1d1c5a3b8c55012a1f5cf367b095
SHA256a43ace7477978d67112bae448e43d73c9e16b72604c664ea8ffabc2b313808eb
SHA512e210bd2780a445576deedecabb4e8ec5795631d62db8f9478a2d8902266376c017e16b33e274f3a6e6097197ebd96c9b042aa15946432d19ff540d7d84012fd0
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb