Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
14-07-2020 19:02
Static task
static1
Behavioral task
behavioral1
Sample
proforma invoice.exe
Resource
win7
Behavioral task
behavioral2
Sample
proforma invoice.exe
Resource
win10v200430
General
-
Target
proforma invoice.exe
-
Size
394KB
-
MD5
d8a0ede0fcd30761f746596b82919aeb
-
SHA1
f00457715b1f97e4327d3d79d51bc6d82d9a988c
-
SHA256
f519262929d4793f6fa538f80ce1a4c378b6bfa16b09cb8ac63475fd1b1bd39b
-
SHA512
49f4ededbc3b23281b9a01d9c5e67ee168342972992fbea913d28f071d7bad91ee451c12516784f3b96c77907cce2f429891070c6f412cf71016efc8d1c0f4d3
Malware Config
Extracted
azorult
https://hotelavlokan.com/fungg/32/index.php
Signatures
-
JavaScript code in executable 1 IoCs
resource yara_rule behavioral2/files/0x000100000001ad8a-3.dat js -
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3812 set thread context of 1172 3812 proforma invoice.exe 68 -
Loads dropped DLL 5 IoCs
pid Process 1172 RegAsm.exe 1172 RegAsm.exe 1172 RegAsm.exe 1172 RegAsm.exe 1172 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1172 RegAsm.exe 1172 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1172 3812 proforma invoice.exe 68 PID 3812 wrote to memory of 1172 3812 proforma invoice.exe 68 PID 3812 wrote to memory of 1172 3812 proforma invoice.exe 68 PID 3812 wrote to memory of 1172 3812 proforma invoice.exe 68 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3812 proforma invoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:3812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks processor information in registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1172
-