Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7 -
submitted
28-10-2020 02:43
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe
Resource
win10
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe
-
Size
485KB
-
MD5
cc219392a073e3c644174607af417b93
-
SHA1
bc886a54b29a6176d88809a364c669d013403378
-
SHA256
ea9930998c8123058a6d1768c857bf6504a933be30556afb4dad2e192e4e8c45
-
SHA512
d72ce4cbd922007ac0e092826cfdc7a15071a4754404095aafba3a1fd9bcf86b24091ff9aed1f2f6b5535787253cf34707e08c036b0399acc42fa7fd4959659b
Malware Config
Extracted
azorult
http://workwithjoshuaking.com/ssq/cow/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
AddInProcess32.exeAddInProcess32.exepid process 112 AddInProcess32.exe 1964 AddInProcess32.exe -
Loads dropped DLL 11 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exeWerFault.exepid process 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exedescription pid process target process PID 1892 set thread context of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 set thread context of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 860 112 WerFault.exe AddInProcess32.exe 1812 1892 WerFault.exe SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exeWerFault.exeWerFault.exepid process 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 860 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe 1812 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe Token: SeTakeOwnershipPrivilege 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe Token: SeRestorePrivilege 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe Token: SeDebugPrivilege 860 WerFault.exe Token: SeDebugPrivilege 1812 WerFault.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exeAddInProcess32.exedescription pid process target process PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 112 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 112 wrote to memory of 860 112 AddInProcess32.exe WerFault.exe PID 112 wrote to memory of 860 112 AddInProcess32.exe WerFault.exe PID 112 wrote to memory of 860 112 AddInProcess32.exe WerFault.exe PID 112 wrote to memory of 860 112 AddInProcess32.exe WerFault.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1964 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe AddInProcess32.exe PID 1892 wrote to memory of 1812 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe WerFault.exe PID 1892 wrote to memory of 1812 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe WerFault.exe PID 1892 wrote to memory of 1812 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe WerFault.exe PID 1892 wrote to memory of 1812 1892 SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 7043⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 29202⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
6a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39
-
MD5
14ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
MD5
14ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b