Analysis
-
max time kernel
60s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-11-2020 18:06
Static task
static1
Behavioral task
behavioral1
Sample
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe
Resource
win10v20201028
General
-
Target
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe
-
Size
1.9MB
-
MD5
a6c9c1928c989b8f9197f438b672e2cc
-
SHA1
76408657d60ea841f68cb78d37793e62b721014c
-
SHA256
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1
-
SHA512
b9d4e00975bcee7f08735ec987410cb5be4a41bfed7aff4f79b936e28e827b9a20755dbc46a691267111db33a6dcb148d132580dd8170d3ef2e0cda80b7bc2f5
Malware Config
Extracted
azorult
http://qdrenfa.com/~zadmin/lk/a/az/ch/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe = "0" 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exepid process 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exedescription pid process target process PID 3980 set thread context of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3988 3980 WerFault.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2160 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
powershell.exe22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exeWerFault.exepid process 4040 powershell.exe 4040 powershell.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 4040 powershell.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe 3988 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exepowershell.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe Token: SeDebugPrivilege 4040 powershell.exe Token: SeRestorePrivilege 3988 WerFault.exe Token: SeBackupPrivilege 3988 WerFault.exe Token: SeDebugPrivilege 3988 WerFault.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exedescription pid process target process PID 3980 wrote to memory of 2160 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe timeout.exe PID 3980 wrote to memory of 2160 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe timeout.exe PID 3980 wrote to memory of 2160 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe timeout.exe PID 3980 wrote to memory of 4040 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe powershell.exe PID 3980 wrote to memory of 4040 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe powershell.exe PID 3980 wrote to memory of 4040 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe powershell.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe PID 3980 wrote to memory of 3872 3980 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe 22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe"C:\Users\Admin\AppData\Local\Temp\22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe"1⤵
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\timeout.exetimeout 42⤵
- Delays execution with timeout.exe
PID:2160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe"C:\Users\Admin\AppData\Local\Temp\22f28d25bf6b26e0d79836e03efe49e325a6eea6b06dfea97a03c62a578f7fb1.exe"2⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 20602⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2160-4-0x0000000000000000-mapping.dmp
-
memory/3872-17-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3872-20-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/3872-18-0x000000000041A684-mapping.dmp
-
memory/3980-1-0x0000000000ED0000-0x0000000000ED1000-memory.dmpFilesize
4KB
-
memory/3980-3-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/3980-5-0x0000000001A60000-0x0000000001AC2000-memory.dmpFilesize
392KB
-
memory/3980-6-0x0000000007140000-0x0000000007141000-memory.dmpFilesize
4KB
-
memory/3980-0-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/3988-24-0x00000000057E0000-0x00000000057E1000-memory.dmpFilesize
4KB
-
memory/3988-21-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/4040-8-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/4040-9-0x0000000004650000-0x0000000004651000-memory.dmpFilesize
4KB
-
memory/4040-14-0x0000000007AE0000-0x0000000007AE1000-memory.dmpFilesize
4KB
-
memory/4040-15-0x00000000072C0000-0x00000000072C1000-memory.dmpFilesize
4KB
-
memory/4040-16-0x00000000081F0000-0x00000000081F1000-memory.dmpFilesize
4KB
-
memory/4040-12-0x0000000007170000-0x0000000007171000-memory.dmpFilesize
4KB
-
memory/4040-11-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/4040-19-0x0000000008140000-0x0000000008141000-memory.dmpFilesize
4KB
-
memory/4040-10-0x0000000007360000-0x0000000007361000-memory.dmpFilesize
4KB
-
memory/4040-13-0x0000000007250000-0x0000000007251000-memory.dmpFilesize
4KB
-
memory/4040-7-0x0000000000000000-mapping.dmp
-
memory/4040-28-0x0000000008F30000-0x0000000008F63000-memory.dmpFilesize
204KB
-
memory/4040-35-0x0000000008F10000-0x0000000008F11000-memory.dmpFilesize
4KB
-
memory/4040-36-0x0000000009280000-0x0000000009281000-memory.dmpFilesize
4KB
-
memory/4040-37-0x0000000009430000-0x0000000009431000-memory.dmpFilesize
4KB
-
memory/4040-38-0x00000000093E0000-0x00000000093E1000-memory.dmpFilesize
4KB
-
memory/4040-40-0x00000000093D0000-0x00000000093D1000-memory.dmpFilesize
4KB