Analysis
-
max time kernel
125s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-11-2020 18:06
Static task
static1
Behavioral task
behavioral1
Sample
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe
Resource
win10v20201028
General
-
Target
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe
-
Size
665KB
-
MD5
5a53757b89c36371c230f538af7c88be
-
SHA1
700d6f4842b10e50241af15a76193d0e8589c919
-
SHA256
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc
-
SHA512
4ec554af412268d8630522ec11a0e765d64cfa1632b2e37983e4d83058f5a526acc769175f0044cfed7d559ff08ddd01b1f7b0cc4c86e69b92bc1cc552e5c631
Malware Config
Extracted
azorult
https://www.colegionewtonsatipo.com/wp/PL341/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exedescription pid process target process PID 1136 set thread context of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exepid process 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exedescription pid process Token: SeDebugPrivilege 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exedescription pid process target process PID 1136 wrote to memory of 3320 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe schtasks.exe PID 1136 wrote to memory of 3320 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe schtasks.exe PID 1136 wrote to memory of 3320 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe schtasks.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe PID 1136 wrote to memory of 388 1136 c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe"C:\Users\Admin\AppData\Local\Temp\c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GdqmbibzRCsneB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3A1C.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe"C:\Users\Admin\AppData\Local\Temp\c466e40f734907249b98c31faefbf51c6da78cfa88159f03f661a7b8157babbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3A1C.tmpMD5
d4c80e213c594b1481d3f91d44bb2093
SHA1f01b26950cec5fb3fca6cb7ce54b3792b2d08d53
SHA256e485b64a920a3ffb6057fb5ec63b98c6ce85ea0bf8ee85fea076b50277e327d9
SHA512b0684080bcb38b1672c58188701babd884dd9b3261e35484ecd93c7b0bf1090c42ae056a30e96dfb110790d0d4b735ee11cb795c5847a03c6b1143a285f82fe1
-
memory/388-16-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/388-15-0x000000000041A684-mapping.dmp
-
memory/388-14-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1136-5-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/1136-6-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/1136-7-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/1136-8-0x0000000004E80000-0x0000000004E8B000-memory.dmpFilesize
44KB
-
memory/1136-9-0x00000000059E0000-0x0000000005A33000-memory.dmpFilesize
332KB
-
memory/1136-10-0x0000000000C80000-0x0000000000C9F000-memory.dmpFilesize
124KB
-
memory/1136-11-0x0000000005C00000-0x0000000005C01000-memory.dmpFilesize
4KB
-
memory/1136-0-0x0000000073BE0000-0x00000000742CE000-memory.dmpFilesize
6.9MB
-
memory/1136-4-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/1136-3-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/1136-1-0x0000000000460000-0x0000000000461000-memory.dmpFilesize
4KB
-
memory/3320-12-0x0000000000000000-mapping.dmp