Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08-07-2020 15:20
Static task
static1
Behavioral task
behavioral1
Sample
evtrbz5n6um7j54g7.exe
Resource
win7
Behavioral task
behavioral2
Sample
evtrbz5n6um7j54g7.exe
Resource
win10v200430
General
-
Target
evtrbz5n6um7j54g7.exe
-
Size
1.4MB
-
MD5
5de08824a170627fed763ecbcbf60290
-
SHA1
57a2d4ff47c401e2619ba8626a8c91c6b34377b6
-
SHA256
69fe5bb4b975f9437b6c3bcf3f07dc807a8f2e848f1e0c5802012295b06a742c
-
SHA512
08f3f322e12c7c5d51028254208fda2763d5029d4d4bfb10cc31b2712cc659c7ffdfe1665efae40f4b55639d80ba7ca47a16ddfbc437397b03d56f8c6e81277c
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender 4 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/3592-88-0x0000000000400000-0x000000000040C000-memory.dmp disable_win_def behavioral2/memory/3592-89-0x000000000040616E-mapping.dmp disable_win_def behavioral2/files/0x000300000001ad91-174.dat disable_win_def behavioral2/files/0x000300000001ad91-175.dat disable_win_def -
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon log file 1 IoCs
Detects a log file produced by the Raccoon Stealer.
yara_rule raccoon_log_file -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 2668 HJnbva.exe 2792 IOmsda.exe 1016 HJnbva.exe 3956 IOmsda.exe 3832 6szqoNQkJU.exe 3820 ayEfG1mF0D.exe 2856 pMcxbziCBw.exe 2644 oab9exiVqG.exe 3592 pMcxbziCBw.exe 4112 yygp3zyv.exe -
Loads dropped DLL 9 IoCs
pid Process 3956 IOmsda.exe 3956 IOmsda.exe 3956 IOmsda.exe 2900 evtrbz5n6um7j54g7.exe 2900 evtrbz5n6um7j54g7.exe 2900 evtrbz5n6um7j54g7.exe 2900 evtrbz5n6um7j54g7.exe 2900 evtrbz5n6um7j54g7.exe 2900 evtrbz5n6um7j54g7.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\LocalLow\cr6im03b56g32r\desktop.ini evtrbz5n6um7j54g7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2416 set thread context of 2900 2416 evtrbz5n6um7j54g7.exe 70 PID 2668 set thread context of 1016 2668 HJnbva.exe 71 PID 2792 set thread context of 3956 2792 IOmsda.exe 72 PID 2856 set thread context of 3592 2856 pMcxbziCBw.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 352 3820 WerFault.exe 79 1128 2644 WerFault.exe 81 -
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString IOmsda.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2860 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 664 taskkill.exe 4232 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2416 evtrbz5n6um7j54g7.exe 2668 HJnbva.exe 2792 IOmsda.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 664 taskkill.exe Token: SeDebugPrivilege 3592 pMcxbziCBw.exe Token: SeRestorePrivilege 352 WerFault.exe Token: SeBackupPrivilege 352 WerFault.exe Token: SeDebugPrivilege 352 WerFault.exe Token: SeDebugPrivilege 1128 WerFault.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2416 evtrbz5n6um7j54g7.exe 2668 HJnbva.exe 2792 IOmsda.exe 3592 pMcxbziCBw.exe 3592 pMcxbziCBw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2668 2416 evtrbz5n6um7j54g7.exe 68 PID 2416 wrote to memory of 2668 2416 evtrbz5n6um7j54g7.exe 68 PID 2416 wrote to memory of 2668 2416 evtrbz5n6um7j54g7.exe 68 PID 2416 wrote to memory of 2792 2416 evtrbz5n6um7j54g7.exe 69 PID 2416 wrote to memory of 2792 2416 evtrbz5n6um7j54g7.exe 69 PID 2416 wrote to memory of 2792 2416 evtrbz5n6um7j54g7.exe 69 PID 2416 wrote to memory of 2900 2416 evtrbz5n6um7j54g7.exe 70 PID 2416 wrote to memory of 2900 2416 evtrbz5n6um7j54g7.exe 70 PID 2416 wrote to memory of 2900 2416 evtrbz5n6um7j54g7.exe 70 PID 2416 wrote to memory of 2900 2416 evtrbz5n6um7j54g7.exe 70 PID 2668 wrote to memory of 1016 2668 HJnbva.exe 71 PID 2668 wrote to memory of 1016 2668 HJnbva.exe 71 PID 2668 wrote to memory of 1016 2668 HJnbva.exe 71 PID 2668 wrote to memory of 1016 2668 HJnbva.exe 71 PID 2792 wrote to memory of 3956 2792 IOmsda.exe 72 PID 2792 wrote to memory of 3956 2792 IOmsda.exe 72 PID 2792 wrote to memory of 3956 2792 IOmsda.exe 72 PID 2792 wrote to memory of 3956 2792 IOmsda.exe 72 PID 3956 wrote to memory of 500 3956 IOmsda.exe 73 PID 3956 wrote to memory of 500 3956 IOmsda.exe 73 PID 3956 wrote to memory of 500 3956 IOmsda.exe 73 PID 500 wrote to memory of 664 500 cmd.exe 75 PID 500 wrote to memory of 664 500 cmd.exe 75 PID 500 wrote to memory of 664 500 cmd.exe 75 PID 2900 wrote to memory of 3832 2900 evtrbz5n6um7j54g7.exe 78 PID 2900 wrote to memory of 3832 2900 evtrbz5n6um7j54g7.exe 78 PID 2900 wrote to memory of 3832 2900 evtrbz5n6um7j54g7.exe 78 PID 2900 wrote to memory of 3820 2900 evtrbz5n6um7j54g7.exe 79 PID 2900 wrote to memory of 3820 2900 evtrbz5n6um7j54g7.exe 79 PID 2900 wrote to memory of 3820 2900 evtrbz5n6um7j54g7.exe 79 PID 2900 wrote to memory of 2856 2900 evtrbz5n6um7j54g7.exe 80 PID 2900 wrote to memory of 2856 2900 evtrbz5n6um7j54g7.exe 80 PID 2900 wrote to memory of 2856 2900 evtrbz5n6um7j54g7.exe 80 PID 2900 wrote to memory of 2644 2900 evtrbz5n6um7j54g7.exe 81 PID 2900 wrote to memory of 2644 2900 evtrbz5n6um7j54g7.exe 81 PID 2900 wrote to memory of 2644 2900 evtrbz5n6um7j54g7.exe 81 PID 2900 wrote to memory of 2104 2900 evtrbz5n6um7j54g7.exe 82 PID 2900 wrote to memory of 2104 2900 evtrbz5n6um7j54g7.exe 82 PID 2900 wrote to memory of 2104 2900 evtrbz5n6um7j54g7.exe 82 PID 2104 wrote to memory of 2860 2104 cmd.exe 84 PID 2104 wrote to memory of 2860 2104 cmd.exe 84 PID 2104 wrote to memory of 2860 2104 cmd.exe 84 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85 PID 3832 wrote to memory of 3888 3832 6szqoNQkJU.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"C:\Users\Admin\AppData\Local\Temp\HJnbva.exe"3⤵
- Executes dropped EXE
PID:1016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"C:\Users\Admin\AppData\Local\Temp\IOmsda.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /pid 3956 & erase C:\Users\Admin\AppData\Local\Temp\IOmsda.exe & RD /S /Q C:\\ProgramData\\228750629465680\\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\taskkill.exetaskkill /pid 39565⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\6szqoNQkJU.exe"C:\Users\Admin\AppData\Local\Temp\6szqoNQkJU.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"4⤵PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\ayEfG1mF0D.exe"C:\Users\Admin\AppData\Local\Temp\ayEfG1mF0D.exe"3⤵
- Executes dropped EXE
PID:3820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 11364⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:352
-
-
-
C:\Users\Admin\AppData\Local\Temp\pMcxbziCBw.exe"C:\Users\Admin\AppData\Local\Temp\pMcxbziCBw.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\pMcxbziCBw.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3592 -
\??\c:\windows\SysWOW64\cmstp.exe"c:\windows\system32\cmstp.exe" /au C:\Windows\temp\uknv4j2j.inf5⤵PID:2288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\oab9exiVqG.exe"C:\Users\Admin\AppData\Local\Temp\oab9exiVqG.exe"3⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 11364⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\evtrbz5n6um7j54g7.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:2860
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}1⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Windows\temp\yygp3zyv.exe2⤵PID:1080
-
C:\Windows\temp\yygp3zyv.exeC:\Windows\temp\yygp3zyv.exe3⤵
- Executes dropped EXE
PID:4112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵PID:4164
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cmstp.exe /F2⤵
- Kills process with taskkill
PID:4232
-