Analysis

  • max time kernel
    82s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    10-07-2020 10:21

General

  • Target

    62231fa0b731bd0aac1c55bd8ed15898.exe

  • Size

    242KB

  • MD5

    62231fa0b731bd0aac1c55bd8ed15898

  • SHA1

    d3dd155f601bb80e417b9b0a6cf294215107af46

  • SHA256

    b699a2766f106ff77377780bad431b72ef1748bf989e09f2b82fb73cf30cbde3

  • SHA512

    6539e010a88784c5c6c605038b2edb38c06d060543140e08c405025fd4c825f281e78993309a82dabb26148d5ad5eaf5eb0ea87f9fe95a520cd59d9c508c683c

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62231fa0b731bd0aac1c55bd8ed15898.exe
    "C:\Users\Admin\AppData\Local\Temp\62231fa0b731bd0aac1c55bd8ed15898.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Users\Admin\AppData\Local\Temp\osaz.exe
      "C:\Users\Admin\AppData\Local\Temp\osaz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\osaz.exe
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:3136
    • C:\Users\Admin\AppData\Local\Temp\62231fa0b731bd0aac1c55bd8ed15898.exe
      "{path}"
      2⤵
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3912
      • C:\Users\Admin\AppData\Local\Temp\rc.exe
        "C:\Users\Admin\AppData\Local\Temp\rc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\SysWOW64\TapiUnattend.exe
          "C:\Windows\System32\TapiUnattend.exe"
          4⤵
            PID:2160
        • C:\Users\Admin\AppData\Local\Temp\ac.exe
          "C:\Users\Admin\AppData\Local\Temp\ac.exe"
          3⤵
          • Executes dropped EXE
          PID:852
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 948
            4⤵
            • Program crash
            PID:4044
        • C:\Users\Admin\AppData\Local\Temp\ds1.exe
          "C:\Users\Admin\AppData\Local\Temp\ds1.exe"
          3⤵
          • Executes dropped EXE
          PID:364
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 912
            4⤵
            • Program crash
            • Suspicious use of AdjustPrivilegeToken
            PID:3856
        • C:\Users\Admin\AppData\Local\Temp\ds2.exe
          "C:\Users\Admin\AppData\Local\Temp\ds2.exe"
          3⤵
          • Executes dropped EXE
          PID:1176
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 912
            4⤵
            • Program crash
            PID:1112
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "62231fa0b731bd0aac1c55bd8ed15898.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\SysWOW64\timeout.exe
            C:\Windows\system32\timeout.exe 3
            4⤵
            • Delays execution with timeout.exe
            PID:1800

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ac.exe

      MD5

      c2257678b2fa6523210ba60d4fbfcdda

      SHA1

      1417d42f550ee3ad0d802a298a14712011cfa8fa

      SHA256

      fad6f1e59c3d79075062761a1003d8877f258b30999d5bfef6512c9a09f85a35

      SHA512

      0ca3b162fba84d31afcf700ecbef776dcb9059e1171c9301cef2691d4597870ec9ff4fbc2b041c04e4179d2479f28504cd26d4540a2b3d5026cdc34d0341f2bc

    • C:\Users\Admin\AppData\Local\Temp\ac.exe

      MD5

      c2257678b2fa6523210ba60d4fbfcdda

      SHA1

      1417d42f550ee3ad0d802a298a14712011cfa8fa

      SHA256

      fad6f1e59c3d79075062761a1003d8877f258b30999d5bfef6512c9a09f85a35

      SHA512

      0ca3b162fba84d31afcf700ecbef776dcb9059e1171c9301cef2691d4597870ec9ff4fbc2b041c04e4179d2479f28504cd26d4540a2b3d5026cdc34d0341f2bc

    • C:\Users\Admin\AppData\Local\Temp\ds1.exe

      MD5

      1e00c034fe9dab4478a8a5b88df04b49

      SHA1

      6f3a3bc86c62dd84180675e02a928d06167eec84

      SHA256

      ddf2740467d31c8b672bf66d71d9e4a59c04baf15c63752abfffe37e90c496e4

      SHA512

      3fd2b373ab9496b5129130a44d2b684d1ea5f501255929d9c73b8d2264607ba6a84a1d2eba3a81df054d35081d1a6881c0cd43fa5241e5b121743d6f26cab0e7

    • C:\Users\Admin\AppData\Local\Temp\ds1.exe

      MD5

      1e00c034fe9dab4478a8a5b88df04b49

      SHA1

      6f3a3bc86c62dd84180675e02a928d06167eec84

      SHA256

      ddf2740467d31c8b672bf66d71d9e4a59c04baf15c63752abfffe37e90c496e4

      SHA512

      3fd2b373ab9496b5129130a44d2b684d1ea5f501255929d9c73b8d2264607ba6a84a1d2eba3a81df054d35081d1a6881c0cd43fa5241e5b121743d6f26cab0e7

    • C:\Users\Admin\AppData\Local\Temp\ds2.exe

      MD5

      b11e1b59c55fe58bee59b66a38bc962c

      SHA1

      44c5a2a6f456849f9280294300f5892a8cb53087

      SHA256

      dd788c4aec3c45dd1a524971169ac0cccd3271b1a02544398494385a430edfe9

      SHA512

      a55ed0bfbfb5777c0a379268fd0da95dfc56559887e3b67e516a6cd164f72b52037e880e6e82190946fdc6367c5ac33c11d4bdc56a97c102be3b9a6bfddeff14

    • C:\Users\Admin\AppData\Local\Temp\ds2.exe

      MD5

      b11e1b59c55fe58bee59b66a38bc962c

      SHA1

      44c5a2a6f456849f9280294300f5892a8cb53087

      SHA256

      dd788c4aec3c45dd1a524971169ac0cccd3271b1a02544398494385a430edfe9

      SHA512

      a55ed0bfbfb5777c0a379268fd0da95dfc56559887e3b67e516a6cd164f72b52037e880e6e82190946fdc6367c5ac33c11d4bdc56a97c102be3b9a6bfddeff14

    • C:\Users\Admin\AppData\Local\Temp\osaz.exe

      MD5

      55a24afe65e5d8459cc31973277d1909

      SHA1

      5c045b7d2c2a083ac65927519dd85339c7b58aa5

      SHA256

      8959562f5a87f40b9c3917a98e10d68e2c459c8df9bdd9664f615af6d5b9959e

      SHA512

      5fe45d4de5b113b97e77752b25da0b4e234c78321e51d85c7a9fcea8e295394e1aa2e454c41381107b92d91a4872c86b30a67ca0604fc774459dfce2bb23a9f1

    • C:\Users\Admin\AppData\Local\Temp\osaz.exe

      MD5

      55a24afe65e5d8459cc31973277d1909

      SHA1

      5c045b7d2c2a083ac65927519dd85339c7b58aa5

      SHA256

      8959562f5a87f40b9c3917a98e10d68e2c459c8df9bdd9664f615af6d5b9959e

      SHA512

      5fe45d4de5b113b97e77752b25da0b4e234c78321e51d85c7a9fcea8e295394e1aa2e454c41381107b92d91a4872c86b30a67ca0604fc774459dfce2bb23a9f1

    • C:\Users\Admin\AppData\Local\Temp\osaz.exe

      MD5

      55a24afe65e5d8459cc31973277d1909

      SHA1

      5c045b7d2c2a083ac65927519dd85339c7b58aa5

      SHA256

      8959562f5a87f40b9c3917a98e10d68e2c459c8df9bdd9664f615af6d5b9959e

      SHA512

      5fe45d4de5b113b97e77752b25da0b4e234c78321e51d85c7a9fcea8e295394e1aa2e454c41381107b92d91a4872c86b30a67ca0604fc774459dfce2bb23a9f1

    • C:\Users\Admin\AppData\Local\Temp\rc.exe

      MD5

      0c6a22a028ce02e10608bb44b7b4c66f

      SHA1

      686ca5b3fdb1606769054107783ab4ad49a3acec

      SHA256

      491cff43b259addd44a312094b15674d2c33c9ab901500130fead03e7d9d6530

      SHA512

      dbee8252a20e0e90242282b14c76ca8256700055b65f27f3b19131bd27613a5168363d4507daac641234504f15b3b6d4a53140b5c591e6df732aa253087ffaaa

    • C:\Users\Admin\AppData\Local\Temp\rc.exe

      MD5

      0c6a22a028ce02e10608bb44b7b4c66f

      SHA1

      686ca5b3fdb1606769054107783ab4ad49a3acec

      SHA256

      491cff43b259addd44a312094b15674d2c33c9ab901500130fead03e7d9d6530

      SHA512

      dbee8252a20e0e90242282b14c76ca8256700055b65f27f3b19131bd27613a5168363d4507daac641234504f15b3b6d4a53140b5c591e6df732aa253087ffaaa

    • \Users\Admin\AppData\Local\Temp\ED70460B\mozglue.dll

      MD5

      9e682f1eb98a9d41468fc3e50f907635

      SHA1

      85e0ceca36f657ddf6547aa0744f0855a27527ee

      SHA256

      830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d

      SHA512

      230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed

    • \Users\Admin\AppData\Local\Temp\ED70460B\msvcp140.dll

      MD5

      109f0f02fd37c84bfc7508d4227d7ed5

      SHA1

      ef7420141bb15ac334d3964082361a460bfdb975

      SHA256

      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

      SHA512

      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

    • \Users\Admin\AppData\Local\Temp\ED70460B\nss3.dll

      MD5

      556ea09421a0f74d31c4c0a89a70dc23

      SHA1

      f739ba9b548ee64b13eb434a3130406d23f836e3

      SHA256

      f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb

      SHA512

      2481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2

    • \Users\Admin\AppData\Local\Temp\ED70460B\vcruntime140.dll

      MD5

      7587bf9cb4147022cd5681b015183046

      SHA1

      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

      SHA256

      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

      SHA512

      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

    • memory/364-89-0x0000000000000000-mapping.dmp

    • memory/632-83-0x0000000000000000-mapping.dmp

    • memory/852-86-0x0000000000000000-mapping.dmp

    • memory/1112-155-0x0000000004100000-0x0000000004101000-memory.dmp

      Filesize

      4KB

    • memory/1176-92-0x0000000000000000-mapping.dmp

    • memory/1492-95-0x0000000000000000-mapping.dmp

    • memory/1800-97-0x0000000000000000-mapping.dmp

    • memory/2160-114-0x0000000000000000-mapping.dmp

    • memory/2160-127-0x0000000000000000-mapping.dmp

    • memory/2160-98-0x0000000000000000-mapping.dmp

    • memory/2160-99-0x0000000000000000-mapping.dmp

    • memory/2160-100-0x0000000000000000-mapping.dmp

    • memory/2160-101-0x0000000000000000-mapping.dmp

    • memory/2160-102-0x0000000000000000-mapping.dmp

    • memory/2160-103-0x0000000000000000-mapping.dmp

    • memory/2160-104-0x0000000000000000-mapping.dmp

    • memory/2160-105-0x0000000000000000-mapping.dmp

    • memory/2160-106-0x0000000000000000-mapping.dmp

    • memory/2160-107-0x0000000000000000-mapping.dmp

    • memory/2160-108-0x0000000000000000-mapping.dmp

    • memory/2160-109-0x0000000000000000-mapping.dmp

    • memory/2160-110-0x0000000000000000-mapping.dmp

    • memory/2160-111-0x0000000000000000-mapping.dmp

    • memory/2160-112-0x0000000000000000-mapping.dmp

    • memory/2160-113-0x0000000000000000-mapping.dmp

    • memory/2160-156-0x0000000000000000-mapping.dmp

    • memory/2160-115-0x0000000000000000-mapping.dmp

    • memory/2160-116-0x0000000000000000-mapping.dmp

    • memory/2160-117-0x0000000000000000-mapping.dmp

    • memory/2160-118-0x0000000000000000-mapping.dmp

    • memory/2160-119-0x0000000000000000-mapping.dmp

    • memory/2160-120-0x0000000000000000-mapping.dmp

    • memory/2160-121-0x0000000000000000-mapping.dmp

    • memory/2160-122-0x0000000000000000-mapping.dmp

    • memory/2160-123-0x0000000000000000-mapping.dmp

    • memory/2160-124-0x0000000000000000-mapping.dmp

    • memory/2160-125-0x0000000000000000-mapping.dmp

    • memory/2160-126-0x0000000000000000-mapping.dmp

    • memory/2160-152-0x0000000000000000-mapping.dmp

    • memory/2160-128-0x0000000000000000-mapping.dmp

    • memory/2160-129-0x0000000000000000-mapping.dmp

    • memory/2160-130-0x0000000000000000-mapping.dmp

    • memory/2160-131-0x0000000000000000-mapping.dmp

    • memory/2160-132-0x0000000000000000-mapping.dmp

    • memory/2160-133-0x0000000000000000-mapping.dmp

    • memory/2160-134-0x0000000000000000-mapping.dmp

    • memory/2160-151-0x0000000000000000-mapping.dmp

    • memory/2160-150-0x0000000000000000-mapping.dmp

    • memory/2160-137-0x0000000000000000-mapping.dmp

    • memory/2160-149-0x0000000000000000-mapping.dmp

    • memory/2160-139-0x0000000000000000-mapping.dmp

    • memory/2160-148-0x0000000000000000-mapping.dmp

    • memory/2160-141-0x0000000000000000-mapping.dmp

    • memory/2160-142-0x0000000000000000-mapping.dmp

    • memory/2160-143-0x0000000000000000-mapping.dmp

    • memory/2160-144-0x0000000000000000-mapping.dmp

    • memory/2160-145-0x0000000000000000-mapping.dmp

    • memory/2160-146-0x0000000000000000-mapping.dmp

    • memory/2160-147-0x0000000000000000-mapping.dmp

    • memory/3136-140-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3136-136-0x000000000040717B-mapping.dmp

    • memory/3136-135-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3276-2-0x0000000000000000-mapping.dmp

    • memory/3856-153-0x0000000004B30000-0x0000000004B31000-memory.dmp

      Filesize

      4KB

    • memory/3912-6-0x000000000041A684-mapping.dmp

    • memory/3912-7-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3912-5-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4044-154-0x0000000004D00000-0x0000000004D01000-memory.dmp

      Filesize

      4KB