Resubmissions

22-05-2020 12:09

200522-ma725l8pgx 10

21-05-2020 12:19

200521-swjn81cqpe 10

Analysis

  • max time kernel
    148s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    22-05-2020 12:09

General

  • Target

    f1b005d740cbdb6bf8586f6fc4df175819027595190e56672e3cce2f0c8cfc21.exe

  • Size

    259KB

  • MD5

    b55f731add11aec9c9b00fe42d8f0f53

  • SHA1

    7114fbda0e1ce247dd227e3d54d22fa809a0c5ee

  • SHA256

    f1b005d740cbdb6bf8586f6fc4df175819027595190e56672e3cce2f0c8cfc21

  • SHA512

    f9291667b8c1ae07e9993cee4269e19765b1c506a2c24411459f60f65da7c513b383cc328345961e8350642cebf0448d85ee93a2594607dd0ee866c39e2d7cb9

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1b005d740cbdb6bf8586f6fc4df175819027595190e56672e3cce2f0c8cfc21.exe
    "C:\Users\Admin\AppData\Local\Temp\f1b005d740cbdb6bf8586f6fc4df175819027595190e56672e3cce2f0c8cfc21.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\cbxncdb.exe
      "C:\Users\Admin\AppData\Local\Temp\cbxncdb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Users\Admin\AppData\Local\Temp\cbxncdb.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        • Windows security modification
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Get-MpPreference -verbose
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:368
    • C:\Users\Admin\AppData\Local\Temp\f1b005d740cbdb6bf8586f6fc4df175819027595190e56672e3cce2f0c8cfc21.exe
      "{path}"
      2⤵
        PID:1616

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Defense Evasion

    Modify Registry

    2
    T1112

    Disabling Security Tools

    2
    T1089

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\cbxncdb.exe
      MD5

      598216c1f4df42b96265e40d826a029b

      SHA1

      5299280a7093ece1ce4cc8bd9dbbd57115cf93a2

      SHA256

      74bd0a0f99f46bfc7106edc3f4d360d9c0bdcba209cbedb685f2131c9482cc3b

      SHA512

      ea4d008e55c16157e1374b03d142ddb34fe219114f42c6f49fb0f9b0a7c9e0abe5be0e97162a2fe820ec7b7d3a8daa4acdf2324df44445d1190e23da1a0d59b2

    • C:\Users\Admin\AppData\Local\Temp\cbxncdb.exe
      MD5

      598216c1f4df42b96265e40d826a029b

      SHA1

      5299280a7093ece1ce4cc8bd9dbbd57115cf93a2

      SHA256

      74bd0a0f99f46bfc7106edc3f4d360d9c0bdcba209cbedb685f2131c9482cc3b

      SHA512

      ea4d008e55c16157e1374b03d142ddb34fe219114f42c6f49fb0f9b0a7c9e0abe5be0e97162a2fe820ec7b7d3a8daa4acdf2324df44445d1190e23da1a0d59b2

    • C:\Users\Admin\AppData\Local\Temp\cbxncdb.exe
      MD5

      598216c1f4df42b96265e40d826a029b

      SHA1

      5299280a7093ece1ce4cc8bd9dbbd57115cf93a2

      SHA256

      74bd0a0f99f46bfc7106edc3f4d360d9c0bdcba209cbedb685f2131c9482cc3b

      SHA512

      ea4d008e55c16157e1374b03d142ddb34fe219114f42c6f49fb0f9b0a7c9e0abe5be0e97162a2fe820ec7b7d3a8daa4acdf2324df44445d1190e23da1a0d59b2

    • \Users\Admin\AppData\Local\Temp\cbxncdb.exe
      MD5

      598216c1f4df42b96265e40d826a029b

      SHA1

      5299280a7093ece1ce4cc8bd9dbbd57115cf93a2

      SHA256

      74bd0a0f99f46bfc7106edc3f4d360d9c0bdcba209cbedb685f2131c9482cc3b

      SHA512

      ea4d008e55c16157e1374b03d142ddb34fe219114f42c6f49fb0f9b0a7c9e0abe5be0e97162a2fe820ec7b7d3a8daa4acdf2324df44445d1190e23da1a0d59b2

    • \Users\Admin\AppData\Local\Temp\cbxncdb.exe
      MD5

      598216c1f4df42b96265e40d826a029b

      SHA1

      5299280a7093ece1ce4cc8bd9dbbd57115cf93a2

      SHA256

      74bd0a0f99f46bfc7106edc3f4d360d9c0bdcba209cbedb685f2131c9482cc3b

      SHA512

      ea4d008e55c16157e1374b03d142ddb34fe219114f42c6f49fb0f9b0a7c9e0abe5be0e97162a2fe820ec7b7d3a8daa4acdf2324df44445d1190e23da1a0d59b2

    • memory/1040-6-0x0000000000000000-0x0000000000000000-disk.dmp
    • memory/1616-3-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1616-4-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1792-8-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1792-10-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB

    • memory/1792-11-0x0000000000400000-0x0000000000408000-memory.dmp
      Filesize

      32KB