Analysis
-
max time kernel
4s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 16:45
Behavioral task
behavioral1
Sample
5ac09948fd5c5b956bae13a3f3bdd690N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ac09948fd5c5b956bae13a3f3bdd690N.exe
Resource
win10v2004-20240910-en
General
-
Target
5ac09948fd5c5b956bae13a3f3bdd690N.exe
-
Size
2.0MB
-
MD5
5ac09948fd5c5b956bae13a3f3bdd690
-
SHA1
53086ff08d6a12b48d348af7efd7c05d87ffedfc
-
SHA256
cbb7413813ba6713fc39d1f8f1657b6ca85b4cd930f2751b9f37631855c6ce09
-
SHA512
06d1846d3634d825586156576e3d554eaeac08b0f8a319a553fc7b300fbd9d89836f1979e28fe83a3114887af963119a6682c00831d98e5035eb25e5e0990dce
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYa:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YM
Malware Config
Extracted
azorult
http://0x21.in:8000/_az/
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
description flow ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ac09948fd5c5b956bae13a3f3bdd690N.exe 5 ip-api.com Process not Found 43 ip-api.com Process not Found -
Quasar payload 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7a-12.dat family_quasar behavioral2/memory/4012-32-0x0000000000520000-0x000000000057E000-memory.dmp family_quasar behavioral2/files/0x000a000000023b7c-53.dat family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 5ac09948fd5c5b956bae13a3f3bdd690N.exe -
Executes dropped EXE 3 IoCs
pid Process 3136 vnc.exe 4012 windef.exe 4460 winsock.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\u: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\v: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\q: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\z: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\a: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\j: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\m: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\n: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\p: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\h: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\i: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\o: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\w: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\s: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\t: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\x: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\b: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\e: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\g: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\l: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\r: 5ac09948fd5c5b956bae13a3f3bdd690N.exe File opened (read-only) \??\y: 5ac09948fd5c5b956bae13a3f3bdd690N.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com 43 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b7c-53.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1404 set thread context of 3376 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 5112 3136 WerFault.exe 86 4888 4460 WerFault.exe 99 1200 4356 WerFault.exe 113 3128 4772 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ac09948fd5c5b956bae13a3f3bdd690N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ac09948fd5c5b956bae13a3f3bdd690N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1196 PING.EXE 1156 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1196 PING.EXE 1156 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1480 schtasks.exe 3628 schtasks.exe 220 schtasks.exe 1968 schtasks.exe 4536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4012 windef.exe Token: SeDebugPrivilege 4460 winsock.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4460 winsock.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1404 wrote to memory of 3136 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 86 PID 1404 wrote to memory of 3136 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 86 PID 1404 wrote to memory of 3136 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 86 PID 1404 wrote to memory of 4012 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 88 PID 1404 wrote to memory of 4012 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 88 PID 1404 wrote to memory of 4012 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 88 PID 3136 wrote to memory of 1008 3136 vnc.exe 89 PID 3136 wrote to memory of 1008 3136 vnc.exe 89 PID 3136 wrote to memory of 1008 3136 vnc.exe 89 PID 1404 wrote to memory of 3376 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 91 PID 1404 wrote to memory of 3376 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 91 PID 1404 wrote to memory of 3376 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 91 PID 1404 wrote to memory of 3376 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 91 PID 1404 wrote to memory of 3376 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 91 PID 1404 wrote to memory of 3628 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 93 PID 1404 wrote to memory of 3628 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 93 PID 1404 wrote to memory of 3628 1404 5ac09948fd5c5b956bae13a3f3bdd690N.exe 93 PID 4012 wrote to memory of 220 4012 windef.exe 97 PID 4012 wrote to memory of 220 4012 windef.exe 97 PID 4012 wrote to memory of 220 4012 windef.exe 97 PID 4012 wrote to memory of 4460 4012 windef.exe 99 PID 4012 wrote to memory of 4460 4012 windef.exe 99 PID 4012 wrote to memory of 4460 4012 windef.exe 99 PID 4460 wrote to memory of 1968 4460 winsock.exe 100 PID 4460 wrote to memory of 1968 4460 winsock.exe 100 PID 4460 wrote to memory of 1968 4460 winsock.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ac09948fd5c5b956bae13a3f3bdd690N.exe"C:\Users\Admin\AppData\Local\Temp\5ac09948fd5c5b956bae13a3f3bdd690N.exe"1⤵
- Quasar RAT
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 5483⤵
- Program crash
PID:5112
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:220
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5ur921Llp6O5.bat" "4⤵PID:4948
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:1552
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1196
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:4772
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\V6Dkp9I5rrnl.bat" "6⤵PID:3696
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4968
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1156
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"7⤵PID:3572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 21766⤵
- Program crash
PID:3128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 16924⤵
- Program crash
PID:4888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5ac09948fd5c5b956bae13a3f3bdd690N.exe"C:\Users\Admin\AppData\Local\Temp\5ac09948fd5c5b956bae13a3f3bdd690N.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3136 -ip 31361⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4460 -ip 44601⤵PID:4920
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:4356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 4883⤵
- Program crash
PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:2740
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵PID:844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4356 -ip 43561⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4772 -ip 47721⤵PID:3160
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2604
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
208B
MD597cb1db466b1fd159503005c3ce3efac
SHA1d8cb8a6eb557c1ab688d7cc9ea8b03195ee8b903
SHA25651d23b508c25dab9a8665cd9ff400ac231bb5d163db4bfe86641711ba2035325
SHA512137ae20a4c2962a40c32a7dc6968e42fd87c0c4a02bb78e2a47c7d213584b11f6bab502607a6d43d34fc33129484689b51b21608f59c1e1052a9d3e8015b9831
-
Filesize
208B
MD5c2cae3cd4184e5960ce7b32cd57a7d4a
SHA1cf70b175f71ed5d7007e0229755eeb29b791bf3b
SHA2562e2f7b7b2136b68087453b78f9bc0962f7e536c58d1bc9f3abd30776248c241d
SHA51233474caa5e72c25d579b133bf8f12a3725f59a5a4303f84054a30b0eb684a5ce921f8bcf3e912d7925fa44e7d842641c4d25bc43ec7bfa9ebb21949e5a660580
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
Filesize
224B
MD5fbd435b77d8dff12e98e933fb8ec42a6
SHA1e199b1a78bc9c6389b3832631585bcaccd60faf3
SHA2569381d91e7eefb6ed47127eaefd4ebbe0e39f88e692e1dfb8ccc8968fac15fb5a
SHA51218cef252238b004caecb6fdb8888199590803d8ac68ede493216ba2eabf716748f0b87699887df344073710945ec4f497947875be59887bd769fde805e3be201
-
Filesize
2.0MB
MD52fdae102380aad510faf206cdc0081e1
SHA124ac57e6fdaba4a51cfcb0e8c03a38b80bbe54d1
SHA256ed5c0b6841a658881aae367524a6e7ed294ebb60391c1d2fdc9231760bed53a9
SHA5128e5b6a2d80ebfdf99a5cf4c37e74adcd00a1a649c7c53cffa102d09d119f6c04ed0f12c6674fe7a30b3bb973b7fbc30d76871e932a6588eae4f7e89ed0dfaeec