Analysis

  • max time kernel
    36s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 11:00

General

  • Target

    964221e2d1782fa804dc6e965ee4f920N.exe

  • Size

    2.0MB

  • MD5

    964221e2d1782fa804dc6e965ee4f920

  • SHA1

    be0fcc6e0e64cee8bf68ca0f8665b06dc26933e6

  • SHA256

    b3c2f56de0655f102fe52ba1aec7369f7a79bf37f563c5f1efe41211d26b2d09

  • SHA512

    ab4a683dc080d1c0f5f584a20631255d47e2745305c5e116f89e5cdb636f611fd8cf28b62acca95a8ab4c224a9bc62b21208b81722383323d1357da777305bc6

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYu:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y0

Malware Config

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964221e2d1782fa804dc6e965ee4f920N.exe
    "C:\Users\Admin\AppData\Local\Temp\964221e2d1782fa804dc6e965ee4f920N.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:364
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
          PID:2188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 548
          3⤵
          • Program crash
          PID:1136
      • C:\Users\Admin\AppData\Local\Temp\windef.exe
        "C:\Users\Admin\AppData\Local\Temp\windef.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:692
        • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
          "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
            4⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2932
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Kzmrd1Vv01cX.bat" "
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3028
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3228
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 10 localhost
              5⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3972
            • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
              "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
              5⤵
                PID:2012
                • C:\Windows\SysWOW64\schtasks.exe
                  "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                  6⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:3476
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KNy8g7YrLypf.bat" "
                  6⤵
                    PID:3296
                    • C:\Windows\SysWOW64\chcp.com
                      chcp 65001
                      7⤵
                        PID:440
                      • C:\Windows\SysWOW64\PING.EXE
                        ping -n 10 localhost
                        7⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Runs ping.exe
                        PID:2112
                      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                        7⤵
                          PID:4344
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 1972
                        6⤵
                        • Program crash
                        PID:4264
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 1084
                    4⤵
                    • Program crash
                    PID:3196
              • C:\Users\Admin\AppData\Local\Temp\964221e2d1782fa804dc6e965ee4f920N.exe
                "C:\Users\Admin\AppData\Local\Temp\964221e2d1782fa804dc6e965ee4f920N.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2736
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                2⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:4816
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 364 -ip 364
              1⤵
                PID:2580
              • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                1⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Enumerates connected drives
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:968
                • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                  "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                  2⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1956
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k
                    3⤵
                      PID:2716
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 488
                      3⤵
                      • Program crash
                      PID:4856
                  • C:\Users\Admin\AppData\Local\Temp\windef.exe
                    "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                    2⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:3036
                  • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                    "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"
                    2⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:1372
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                    2⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:4556
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1956 -ip 1956
                  1⤵
                    PID:1624
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4244 -ip 4244
                    1⤵
                      PID:4408
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2012 -ip 2012
                      1⤵
                        PID:2248
                      • C:\Windows\system32\dwm.exe
                        "dwm.exe"
                        1⤵
                          PID:2764
                        • C:\Windows\system32\dwm.exe
                          "dwm.exe"
                          1⤵
                            PID:1052
                          • C:\Windows\system32\dwm.exe
                            "dwm.exe"
                            1⤵
                              PID:1136
                            • C:\Windows\system32\dwm.exe
                              "dwm.exe"
                              1⤵
                                PID:2456
                              • C:\Windows\system32\dwm.exe
                                "dwm.exe"
                                1⤵
                                  PID:3692
                                • C:\Windows\system32\dwm.exe
                                  "dwm.exe"
                                  1⤵
                                    PID:4536
                                  • C:\Windows\system32\dwm.exe
                                    "dwm.exe"
                                    1⤵
                                      PID:3620

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windef.exe.log

                                      Filesize

                                      1KB

                                      MD5

                                      10eab9c2684febb5327b6976f2047587

                                      SHA1

                                      a12ed54146a7f5c4c580416aecb899549712449e

                                      SHA256

                                      f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

                                      SHA512

                                      7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

                                    • C:\Users\Admin\AppData\Local\Temp\KNy8g7YrLypf.bat

                                      Filesize

                                      208B

                                      MD5

                                      0b3491601e5d527fdc1107f59cc23d54

                                      SHA1

                                      c232eee5b8351ea4c9ea84b64417e55109afe88a

                                      SHA256

                                      92a5ec62fc6eba5a1122f9fafceea4db77dd5daf084c9774e5434b5594ed4ee5

                                      SHA512

                                      26f7bd0e93255df4d019b2ad64363d0e75901622cef0f2bbecb00ececc69b9f28700be8a4c18e7c5723d7f1743c3d962c32ced62be642b9b4a07a0f3fe2b1508

                                    • C:\Users\Admin\AppData\Local\Temp\Kzmrd1Vv01cX.bat

                                      Filesize

                                      208B

                                      MD5

                                      3704e996b815d40a963e180a90871d51

                                      SHA1

                                      2171e25cf89913896349f048e291bf94c2ceff34

                                      SHA256

                                      c73d6a2e051da798270468bb2308185fa9857257830f211b7854e84f561b9f77

                                      SHA512

                                      9dd1b187d0551bafb7e8fc6d01312285e74211f837858bf35c14488dc6bee8d8a66e253e59165f7ae7a5a45b77f206bb54abde79bae54b54a66fc0a2b872114b

                                    • C:\Users\Admin\AppData\Local\Temp\vnc.exe

                                      Filesize

                                      405KB

                                      MD5

                                      b8ba87ee4c3fc085a2fed0d839aadce1

                                      SHA1

                                      b3a2e3256406330e8b1779199bb2b9865122d766

                                      SHA256

                                      4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4

                                      SHA512

                                      7a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2

                                    • C:\Users\Admin\AppData\Local\Temp\windef.exe

                                      Filesize

                                      349KB

                                      MD5

                                      b4a202e03d4135484d0e730173abcc72

                                      SHA1

                                      01b30014545ea526c15a60931d676f9392ea0c70

                                      SHA256

                                      7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9

                                      SHA512

                                      632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb

                                    • C:\Users\Admin\AppData\Roaming\Logs\09-12-2024

                                      Filesize

                                      224B

                                      MD5

                                      4482a67f6618be6e74b48baed02d0957

                                      SHA1

                                      4ae85f06fcf2eaca658f9fce3164c49ab1985379

                                      SHA256

                                      9ae32d7e69f6471123f57ff9db75fa0ebf359147ce24647663242d05afadde87

                                      SHA512

                                      6c96df0a7f617f2093feba8a27039c41ec06d6bfc3bc0771538a40f9f34dd866601f217124db1184ae050ca8728b89ccc84875310ad8a82457ac73eb522c1593

                                    • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe

                                      Filesize

                                      2.0MB

                                      MD5

                                      6d064c8c676755ab1d1fb9be8787fd60

                                      SHA1

                                      4d2d0f4edc4006d367b2fbf0a3e0ee4a7560c65c

                                      SHA256

                                      c4bb15f60835d479a032ee0d8b46baaa99d1c9733415f9a2cb0400e39874f114

                                      SHA512

                                      4cf481cc90a0dd4f87fe395e51599f17debe2f45bad10fb0622d559ed9eecff80c6a78830d274e5adfdd2180d067da0003e55f5485854887eb0b820530a5c70d

                                    • memory/2192-30-0x00000000009A0000-0x00000000009FE000-memory.dmp

                                      Filesize

                                      376KB

                                    • memory/2192-34-0x0000000005340000-0x00000000053D2000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/2192-35-0x00000000052B0000-0x0000000005316000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/2192-36-0x0000000005FC0000-0x0000000005FD2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2192-37-0x0000000006500000-0x000000000653C000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/2192-33-0x00000000057E0000-0x0000000005D84000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/2192-29-0x00000000737CE000-0x00000000737CF000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2736-28-0x0000000000400000-0x0000000000420000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2736-20-0x0000000000400000-0x0000000000420000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/3628-19-0x0000000003B30000-0x0000000003B31000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4244-45-0x00000000069D0000-0x00000000069DA000-memory.dmp

                                      Filesize

                                      40KB