Analysis
-
max time kernel
137s -
max time network
110s -
platform
windows7_x64 -
resource
win7 -
submitted
08-07-2020 15:20
Static task
static1
Behavioral task
behavioral1
Sample
evtrbz5n6um7j54g7.exe
Resource
win7
Behavioral task
behavioral2
Sample
evtrbz5n6um7j54g7.exe
Resource
win10v200430
General
-
Target
evtrbz5n6um7j54g7.exe
-
Size
1.4MB
-
MD5
5de08824a170627fed763ecbcbf60290
-
SHA1
57a2d4ff47c401e2619ba8626a8c91c6b34377b6
-
SHA256
69fe5bb4b975f9437b6c3bcf3f07dc807a8f2e848f1e0c5802012295b06a742c
-
SHA512
08f3f322e12c7c5d51028254208fda2763d5029d4d4bfb10cc31b2712cc659c7ffdfe1665efae40f4b55639d80ba7ca47a16ddfbc437397b03d56f8c6e81277c
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
9e58d12176867642b44a41ce838ee2f495fc57ff
-
url4cnc
https://telete.in/jrikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
raymond.ug
Extracted
asyncrat
0.5.7B
giuseppe.ug:6970
asdxcvxdfgdnbvrwe.ru:6970
AsyncMutex_6SI8OkPnk
-
aes_key
wmNKpUVCpNWhhJQblim2nnNgKrbxeGKV
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
giuseppe.ug,asdxcvxdfgdnbvrwe.ru
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2164-139-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/2164-140-0x0000000000403BEE-mapping.dmp disable_win_def behavioral1/memory/2164-143-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def behavioral1/memory/2164-145-0x0000000000400000-0x0000000000408000-memory.dmp disable_win_def -
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
yara_rule raccoon_log_file -
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2348-151-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2348-153-0x000000000040C77E-mapping.dmp asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 484 HJnbva.exe 756 IOmsda.exe 1048 HJnbva.exe 1744 IOmsda.exe 484 GMXQNRtJZj.exe 1848 6mnSLGWWt9.exe 1752 w6MaV8rMHj.exe 1036 6l1pgQiDki.exe 2164 6l1pgQiDki.exe 2348 6mnSLGWWt9.exe -
Deletes itself 1 IoCs
pid Process 472 cmd.exe -
Loads dropped DLL 26 IoCs
pid Process 1492 evtrbz5n6um7j54g7.exe 1492 evtrbz5n6um7j54g7.exe 1492 evtrbz5n6um7j54g7.exe 1492 evtrbz5n6um7j54g7.exe 484 HJnbva.exe 756 IOmsda.exe 1744 IOmsda.exe 1744 IOmsda.exe 1744 IOmsda.exe 1744 IOmsda.exe 1744 IOmsda.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1052 evtrbz5n6um7j54g7.exe 1036 6l1pgQiDki.exe 1848 6mnSLGWWt9.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 6l1pgQiDki.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6l1pgQiDki.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\LocalLow\cr6im03b56g32r\desktop.ini evtrbz5n6um7j54g7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1492 set thread context of 1052 1492 evtrbz5n6um7j54g7.exe 26 PID 484 set thread context of 1048 484 HJnbva.exe 27 PID 756 set thread context of 1744 756 IOmsda.exe 28 PID 1036 set thread context of 2164 1036 6l1pgQiDki.exe 47 PID 1848 set thread context of 2348 1848 6mnSLGWWt9.exe 52 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString IOmsda.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2192 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1560 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1952 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 evtrbz5n6um7j54g7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 evtrbz5n6um7j54g7.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1492 evtrbz5n6um7j54g7.exe 484 HJnbva.exe 756 IOmsda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1952 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1492 evtrbz5n6um7j54g7.exe 484 HJnbva.exe 756 IOmsda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 484 1492 evtrbz5n6um7j54g7.exe 24 PID 1492 wrote to memory of 484 1492 evtrbz5n6um7j54g7.exe 24 PID 1492 wrote to memory of 484 1492 evtrbz5n6um7j54g7.exe 24 PID 1492 wrote to memory of 484 1492 evtrbz5n6um7j54g7.exe 24 PID 1492 wrote to memory of 756 1492 evtrbz5n6um7j54g7.exe 25 PID 1492 wrote to memory of 756 1492 evtrbz5n6um7j54g7.exe 25 PID 1492 wrote to memory of 756 1492 evtrbz5n6um7j54g7.exe 25 PID 1492 wrote to memory of 756 1492 evtrbz5n6um7j54g7.exe 25 PID 1492 wrote to memory of 1052 1492 evtrbz5n6um7j54g7.exe 26 PID 1492 wrote to memory of 1052 1492 evtrbz5n6um7j54g7.exe 26 PID 1492 wrote to memory of 1052 1492 evtrbz5n6um7j54g7.exe 26 PID 1492 wrote to memory of 1052 1492 evtrbz5n6um7j54g7.exe 26 PID 1492 wrote to memory of 1052 1492 evtrbz5n6um7j54g7.exe 26 PID 484 wrote to memory of 1048 484 HJnbva.exe 27 PID 484 wrote to memory of 1048 484 HJnbva.exe 27 PID 484 wrote to memory of 1048 484 HJnbva.exe 27 PID 484 wrote to memory of 1048 484 HJnbva.exe 27 PID 484 wrote to memory of 1048 484 HJnbva.exe 27 PID 756 wrote to memory of 1744 756 IOmsda.exe 28 PID 756 wrote to memory of 1744 756 IOmsda.exe 28 PID 756 wrote to memory of 1744 756 IOmsda.exe 28 PID 756 wrote to memory of 1744 756 IOmsda.exe 28 PID 756 wrote to memory of 1744 756 IOmsda.exe 28 PID 1744 wrote to memory of 1608 1744 IOmsda.exe 31 PID 1744 wrote to memory of 1608 1744 IOmsda.exe 31 PID 1744 wrote to memory of 1608 1744 IOmsda.exe 31 PID 1744 wrote to memory of 1608 1744 IOmsda.exe 31 PID 1608 wrote to memory of 1952 1608 cmd.exe 33 PID 1608 wrote to memory of 1952 1608 cmd.exe 33 PID 1608 wrote to memory of 1952 1608 cmd.exe 33 PID 1608 wrote to memory of 1952 1608 cmd.exe 33 PID 1052 wrote to memory of 484 1052 evtrbz5n6um7j54g7.exe 36 PID 1052 wrote to memory of 484 1052 evtrbz5n6um7j54g7.exe 36 PID 1052 wrote to memory of 484 1052 evtrbz5n6um7j54g7.exe 36 PID 1052 wrote to memory of 484 1052 evtrbz5n6um7j54g7.exe 36 PID 1052 wrote to memory of 1848 1052 evtrbz5n6um7j54g7.exe 37 PID 1052 wrote to memory of 1848 1052 evtrbz5n6um7j54g7.exe 37 PID 1052 wrote to memory of 1848 1052 evtrbz5n6um7j54g7.exe 37 PID 1052 wrote to memory of 1848 1052 evtrbz5n6um7j54g7.exe 37 PID 1052 wrote to memory of 1752 1052 evtrbz5n6um7j54g7.exe 38 PID 1052 wrote to memory of 1752 1052 evtrbz5n6um7j54g7.exe 38 PID 1052 wrote to memory of 1752 1052 evtrbz5n6um7j54g7.exe 38 PID 1052 wrote to memory of 1752 1052 evtrbz5n6um7j54g7.exe 38 PID 1052 wrote to memory of 1036 1052 evtrbz5n6um7j54g7.exe 39 PID 1052 wrote to memory of 1036 1052 evtrbz5n6um7j54g7.exe 39 PID 1052 wrote to memory of 1036 1052 evtrbz5n6um7j54g7.exe 39 PID 1052 wrote to memory of 1036 1052 evtrbz5n6um7j54g7.exe 39 PID 1052 wrote to memory of 472 1052 evtrbz5n6um7j54g7.exe 40 PID 1052 wrote to memory of 472 1052 evtrbz5n6um7j54g7.exe 40 PID 1052 wrote to memory of 472 1052 evtrbz5n6um7j54g7.exe 40 PID 1052 wrote to memory of 472 1052 evtrbz5n6um7j54g7.exe 40 PID 472 wrote to memory of 1560 472 cmd.exe 42 PID 472 wrote to memory of 1560 472 cmd.exe 42 PID 472 wrote to memory of 1560 472 cmd.exe 42 PID 472 wrote to memory of 1560 472 cmd.exe 42 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43 PID 484 wrote to memory of 1808 484 GMXQNRtJZj.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"3⤵
- Executes dropped EXE
PID:1048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 1744 & erase C:\Users\Admin\AppData\Local\Temp\IOmsda.exe & RD /S /Q C:\\ProgramData\\693089157969621\\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 17445⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\GMXQNRtJZj.exe"C:\Users\Admin\AppData\Local\Temp\GMXQNRtJZj.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"4⤵PID:1808
-
-
-
C:\Users\Admin\AppData\Local\Temp\6mnSLGWWt9.exe"C:\Users\Admin\AppData\Local\Temp\6mnSLGWWt9.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1848 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KahrGgYA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58C9.tmp"4⤵
- Creates scheduled task(s)
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\6mnSLGWWt9.exe"{path}"4⤵
- Executes dropped EXE
PID:2348
-
-
-
C:\Users\Admin\AppData\Local\Temp\w6MaV8rMHj.exe"C:\Users\Admin\AppData\Local\Temp\w6MaV8rMHj.exe"3⤵
- Executes dropped EXE
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\6l1pgQiDki.exe"C:\Users\Admin\AppData\Local\Temp\6l1pgQiDki.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\6l1pgQiDki.exe"{path}"4⤵
- Executes dropped EXE
- Windows security modification
PID:2164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵PID:2280
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:1560
-
-
-