Analysis
-
max time kernel
4s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 03:25
Behavioral task
behavioral1
Sample
3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe
Resource
win10v2004-20241007-en
General
-
Target
3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe
-
Size
2.0MB
-
MD5
7b88dc02a3b11e27a3e4595c442d30ea
-
SHA1
2546ae7b96ffc096d2f4cf5093290d0a74c09948
-
SHA256
3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78
-
SHA512
9125ed37e104c25779ec7e402e4d55894a9e2764604f786bbc6c54918775eb48c46b0373a8800117c314ff9eb6c6ee2224f48aa0fd8bf7efaa30f98f8bf3c9b8
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYj:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yd
Malware Config
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Extracted
azorult
http://0x21.in:8000/_az/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload 6 IoCs
resource yara_rule behavioral1/files/0x000800000001660b-17.dat family_quasar behavioral1/memory/2932-54-0x0000000001310000-0x000000000136E000-memory.dmp family_quasar behavioral1/memory/1196-64-0x0000000000FA0000-0x0000000000FFE000-memory.dmp family_quasar behavioral1/memory/1736-81-0x0000000000FC0000-0x000000000101E000-memory.dmp family_quasar behavioral1/files/0x0007000000016cab-84.dat family_quasar behavioral1/memory/1372-135-0x0000000000190000-0x00000000001EE000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 2544 vnc.exe 2932 windef.exe -
Loads dropped DLL 8 IoCs
pid Process 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\p: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\y: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\g: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\b: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\e: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\i: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\j: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\m: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\n: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\s: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\a: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\x: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\o: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\z: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\l: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\q: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\r: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\t: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\u: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\v: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\w: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe File opened (read-only) \??\h: 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016cab-84.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2572 set thread context of 2740 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 34 PID 2544 set thread context of 596 2544 vnc.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2160 1196 WerFault.exe 41 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1944 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1944 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2556 schtasks.exe 2900 schtasks.exe 2960 schtasks.exe 1972 schtasks.exe 1836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2544 vnc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2544 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 31 PID 2572 wrote to memory of 2544 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 31 PID 2572 wrote to memory of 2544 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 31 PID 2572 wrote to memory of 2544 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 31 PID 2544 wrote to memory of 596 2544 vnc.exe 32 PID 2544 wrote to memory of 596 2544 vnc.exe 32 PID 2544 wrote to memory of 596 2544 vnc.exe 32 PID 2544 wrote to memory of 596 2544 vnc.exe 32 PID 2544 wrote to memory of 596 2544 vnc.exe 32 PID 2572 wrote to memory of 2932 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 33 PID 2572 wrote to memory of 2932 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 33 PID 2572 wrote to memory of 2932 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 33 PID 2572 wrote to memory of 2932 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 33 PID 2572 wrote to memory of 2740 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 34 PID 2572 wrote to memory of 2740 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 34 PID 2572 wrote to memory of 2740 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 34 PID 2572 wrote to memory of 2740 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 34 PID 2572 wrote to memory of 2740 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 34 PID 2572 wrote to memory of 2740 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 34 PID 2544 wrote to memory of 596 2544 vnc.exe 32 PID 2572 wrote to memory of 2900 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 35 PID 2572 wrote to memory of 2900 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 35 PID 2572 wrote to memory of 2900 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 35 PID 2572 wrote to memory of 2900 2572 3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe 35 PID 2544 wrote to memory of 596 2544 vnc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe"C:\Users\Admin\AppData\Local\Temp\3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵
- Maps connected drives based on registry
PID:596
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2960
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:1196
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1972
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qnqZH93rvBmN.bat" "4⤵PID:1240
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:2088
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1944
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:1736
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:1836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 14084⤵
- Program crash
PID:2160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe"C:\Users\Admin\AppData\Local\Temp\3a4a38ed839a1f73825b8456fc1efa73a65a7af25ba3513472d05cfac5ecef78.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2900
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {95467205-8371-47EB-B4EF-AD29234DB942} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵PID:2608
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe2⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"3⤵PID:560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k4⤵PID:1444
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"3⤵PID:1372
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"3⤵PID:2384
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD5c19a1c259e8b8883514ef4d0b045d4a1
SHA13306fee4842425d02c56fc83cacfb202102323ab
SHA256c433a8855b0e0fdbfc57692e1abc4e4ef14ca47f58d001e5ecfbdde8d35958a6
SHA5129e859231bc7c8051f3f0d48308d4029a45018465d2404c9072386841300160da60a3aba112bfa315f1e0eb013b812d231b636b51c76acbb676dbacfea12f5100
-
Filesize
224B
MD56ecf9ce7416449dc52c085322b46790c
SHA18309a2775afd2e83b8a533eafc8f0e48fd05cbae
SHA2561b39b8c0037075d726d0855c820a55b17b8b192171646d5fb58ea783ade03335
SHA51253899e3b9de186f8a7b9a003cfd1e103f95730713d431c0e50f5626c8d956f05259ff7dd9d889419d6fd34b0b6643b2f76eea9563ec597efafde3cab31b14871
-
Filesize
213B
MD522f81f3e9fd8d0097be7e8fe56f81466
SHA1fef51c3b9069fd34acbc9167f29f9a2c41e2771a
SHA25689c09f42d6f622f48ca2f36f6dd22d82cda511733d8abf54914bd1a03528702a
SHA5124814a3bf996a676591c8fb8e283b530ec124fc866f9c260b60ce9aa9af9e733adb32d1789c46746d040c3253b3cc052227fff9057c1c386cb6ff9a2640df10aa
-
Filesize
2.0MB
MD57e3853f3ebb46bd5bd21dbb35d694d1f
SHA1c6a20fa0a31f91564e49aad9ece9e92c82298883
SHA25697e792ff2abf9bdba5fdf436d63175591ef797ffef768b51d4a31ccdeb9b48f0
SHA51295a5d90175dd3f0d1c42055d5c3e2239e147ac52d1257afb7dd153ff5c8a072f49fec46c656e57deee383cae2de963426042b64e6f9f0ca63ed312df1f9c1fd8
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb