Analysis
-
max time kernel
62s -
max time network
65s -
platform
windows7_x64 -
resource
win7 -
submitted
14-07-2020 19:02
Static task
static1
Behavioral task
behavioral1
Sample
proforma invoice.exe
Resource
win7
Behavioral task
behavioral2
Sample
proforma invoice.exe
Resource
win10v200430
General
-
Target
proforma invoice.exe
-
Size
394KB
-
MD5
d8a0ede0fcd30761f746596b82919aeb
-
SHA1
f00457715b1f97e4327d3d79d51bc6d82d9a988c
-
SHA256
f519262929d4793f6fa538f80ce1a4c378b6bfa16b09cb8ac63475fd1b1bd39b
-
SHA512
49f4ededbc3b23281b9a01d9c5e67ee168342972992fbea913d28f071d7bad91ee451c12516784f3b96c77907cce2f429891070c6f412cf71016efc8d1c0f4d3
Malware Config
Extracted
azorult
https://hotelavlokan.com/fungg/32/index.php
Signatures
-
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\2fda\nss3.dll js -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
proforma invoice.exedescription pid process target process PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe PID 1088 wrote to memory of 1120 1088 proforma invoice.exe RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
proforma invoice.exepid process 1088 proforma invoice.exe -
Loads dropped DLL 16 IoCs
Processes:
RegAsm.exepid process 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe 1120 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RegAsm.exepid process 1120 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
proforma invoice.exedescription pid process target process PID 1088 set thread context of 1120 1088 proforma invoice.exe RegAsm.exe -
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
Processes
-
C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks processor information in registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1120