Analysis
-
max time kernel
3s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 04:17
Behavioral task
behavioral1
Sample
be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe
Resource
win10v2004-20241007-en
General
-
Target
be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe
-
Size
2.0MB
-
MD5
fb4a2cd93ce333b117dedf2ab70c7fa9
-
SHA1
f82dc829865cd26563275f110675afb71c9472c4
-
SHA256
be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9
-
SHA512
017e616a1c864e577199a24370d9ac41acb05641957b4e1e3c92bd12c2570e9e56ad65b953e642eb891ebec1fec8de94c1d9021d58cadff19b1d1f703e20df15
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY4:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y2
Malware Config
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Extracted
azorult
http://0x21.in:8000/_az/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral1/files/0x000800000001686c-26.dat family_quasar behavioral1/memory/2100-31-0x0000000000E00000-0x0000000000E5E000-memory.dmp family_quasar behavioral1/memory/2500-60-0x0000000000E80000-0x0000000000EDE000-memory.dmp family_quasar behavioral1/files/0x0007000000016c95-61.dat family_quasar behavioral1/memory/684-105-0x0000000000E90000-0x0000000000EEE000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 388 vnc.exe 2100 windef.exe -
Loads dropped DLL 12 IoCs
pid Process 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe 3060 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\z: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\e: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\h: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\u: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\w: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\x: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\r: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\s: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\g: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\k: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\l: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\n: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\o: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\i: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\j: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\m: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\q: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\t: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\a: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\b: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\p: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe File opened (read-only) \??\v: be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016c95-61.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 2248 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3060 388 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1760 schtasks.exe 2664 schtasks.exe 1824 schtasks.exe 2836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1032 wrote to memory of 388 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 28 PID 1032 wrote to memory of 388 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 28 PID 1032 wrote to memory of 388 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 28 PID 1032 wrote to memory of 388 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 28 PID 388 wrote to memory of 2260 388 vnc.exe 29 PID 388 wrote to memory of 2260 388 vnc.exe 29 PID 388 wrote to memory of 2260 388 vnc.exe 29 PID 388 wrote to memory of 2260 388 vnc.exe 29 PID 1032 wrote to memory of 2100 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 30 PID 1032 wrote to memory of 2100 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 30 PID 1032 wrote to memory of 2100 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 30 PID 1032 wrote to memory of 2100 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 30 PID 388 wrote to memory of 2260 388 vnc.exe 29 PID 1032 wrote to memory of 2248 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 31 PID 1032 wrote to memory of 2248 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 31 PID 1032 wrote to memory of 2248 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 31 PID 1032 wrote to memory of 2248 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 31 PID 1032 wrote to memory of 2248 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 31 PID 1032 wrote to memory of 2248 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 31 PID 388 wrote to memory of 3060 388 vnc.exe 32 PID 388 wrote to memory of 3060 388 vnc.exe 32 PID 388 wrote to memory of 3060 388 vnc.exe 32 PID 388 wrote to memory of 3060 388 vnc.exe 32 PID 1032 wrote to memory of 1760 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 33 PID 1032 wrote to memory of 1760 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 33 PID 1032 wrote to memory of 1760 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 33 PID 1032 wrote to memory of 1760 1032 be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe"C:\Users\Admin\AppData\Local\Temp\be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 1603⤵
- Loads dropped DLL
- Program crash
PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2664
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:2500
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe"C:\Users\Admin\AppData\Local\Temp\be8659fc470624a33b0c7cbed4f9c83fe1ef4a2acde44ac854d93ea09c9cc7d9.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1760
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7B70FC60-EB2B-48CC-893B-0DBDC669E51D} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵PID:1144
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe2⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"3⤵PID:1364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k4⤵PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"3⤵PID:684
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"3⤵PID:2784
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213B
MD5c2ca33b06b02e0e45b08f7f22a4c9bd2
SHA1478b4080637071ef43c13d4187d9b29ff3a02dad
SHA2565d160cdeac5ae4fd08d419653aa1481100a2b702c2859c87547c26c6f0eea52f
SHA5120d54eb2f7fe2713e9e7ab059b6fab4b759000407f4bcc55745a1ebb5541b2a1acefe08bad40f30bc992e07d18ef7ffa388a041657394ddb5d372a36a015e3bb1
-
Filesize
2.0MB
MD5c1fc8dc35e793d0f8c324632f9217119
SHA1fa442e03989bad16d1410e40214560c61e1cf255
SHA2563bbdc73e19f20f13d2f0f02770bd55c153cb82c4e7ed2bde6eff46ff12ca56e6
SHA5123a2bc15bc70b5537416f6d733462e48662829819ca11fe1e5f13f298f527e70f2fb8dd5a6b67ff4a8662e99b3a7dc97b1e3bbf58d6df46b819edb9f84473e07e
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb