Analysis

  • max time kernel
    129s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-11-2020 13:54

General

  • Target

    Corona-virus-Map.com.bin.exe

  • Size

    3.3MB

  • MD5

    73da2c02c6f8bfd4662dc84820dcd983

  • SHA1

    949b69bf87515ad8945ce9a79f68f8b788c0ae39

  • SHA256

    2b35aa9c70ef66197abfb9bc409952897f9f70818633ab43da85b3825b256307

  • SHA512

    43daa65bc057abc5e07b909eb71361c8488863c7c8a4a271b426b06cb8c16d3f7db8e66051627a50d392ff088cd619e00a7ac075454dccf901a4271251c9c6e3

Malware Config

Extracted

Family

azorult

C2

http://coronavirusstatus.space/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 10 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Corona-virus-Map.com.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Corona-virus-Map.com.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Users\Admin\AppData\Roaming\Z11062600\Corona.exe
      "C:\Users\Admin\AppData\Roaming\Z11062600\Corona.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:728
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.sfx.exe
          Corona.sfx.exe -p3D2oetdNuZUqQHPJmcMDDHYoqkyNVsFk9r -dC:\Windows\System32
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2140
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Corona.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Corona.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3696
            • C:\Users\Admin\AppData\Roaming\Z58538177\bin.exe
              "C:\Users\Admin\AppData\Roaming\Z58538177\bin.exe"
              6⤵
              • Executes dropped EXE
              PID:188
            • C:\Users\Admin\AppData\Roaming\Z58538177\Build.exe
              "C:\Users\Admin\AppData\Roaming\Z58538177\Build.exe"
              6⤵
              • Executes dropped EXE
              • NTFS ADS
              • Suspicious use of WriteProcessMemory
              PID:2332
              • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
                C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • NTFS ADS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:500
                • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe
                  C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\ENU_801FE97C2665CBDE9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\1\*"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2840
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml"
                  8⤵
                  • Views/modifies file attributes
                  PID:196
    • C:\Users\Admin\AppData\Roaming\Z11062600\Corona-virus-Map.com.exe
      "C:\Users\Admin\AppData\Roaming\Z11062600\Corona-virus-Map.com.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3324
  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
    C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2488
  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
    C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1220

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.bat
    MD5

    e9dcbecca02b600ce135f7d58b8cd830

    SHA1

    e8956408efe58fa5934f7f742f6fcaf429964034

    SHA256

    0cd1e499799e4d98f1cb76df08ff7a7f441216ff713dfa97cb6691c68c962cf8

    SHA512

    80001c7a0bac929436d4637ca981ed8c128172920f0e5fbdc99151ae04fad507e4db395253cb2d10b2d2e3b684708e143eddc2c339af3e7ccde2bb02068535ec

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.sfx.exe
    MD5

    3cb9fc1ee05f49438455ba1aea3bca4e

    SHA1

    401431f0781b416f3e237e993b1a283b3a37613e

    SHA256

    148520c746aee00d7330e8c639a0bcd576c9a431acb197e36f27529f5e897fb4

    SHA512

    8456cac4acb3e4d6538c1ef1a9abfdd7e15c6f0dc3a61b2fe24992e2faf256da0fd8ae170add9c363711ff3f85371fe263ccebd72c3524d9147db9261d4dfdd6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.sfx.exe
    MD5

    3cb9fc1ee05f49438455ba1aea3bca4e

    SHA1

    401431f0781b416f3e237e993b1a283b3a37613e

    SHA256

    148520c746aee00d7330e8c639a0bcd576c9a431acb197e36f27529f5e897fb4

    SHA512

    8456cac4acb3e4d6538c1ef1a9abfdd7e15c6f0dc3a61b2fe24992e2faf256da0fd8ae170add9c363711ff3f85371fe263ccebd72c3524d9147db9261d4dfdd6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Corona.exe
    MD5

    27ad5971933d514c3a0e90fe2a0f0389

    SHA1

    b11ea20d95aaea2fde9bee0d7ac5eac0b81a839c

    SHA256

    13c0165703482dd521e1c1185838a6a12ed5e980e7951a130444cf2feed1102e

    SHA512

    d0e9c8fa9ae48abe7bbc9648d8cccff88d58f4392315b20aaca10720e9e2c164641c2b127b26fdba490f677615b4af49c3fbeb4ce60029f2c73bb74888e2eef5

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Corona.exe
    MD5

    27ad5971933d514c3a0e90fe2a0f0389

    SHA1

    b11ea20d95aaea2fde9bee0d7ac5eac0b81a839c

    SHA256

    13c0165703482dd521e1c1185838a6a12ed5e980e7951a130444cf2feed1102e

    SHA512

    d0e9c8fa9ae48abe7bbc9648d8cccff88d58f4392315b20aaca10720e9e2c164641c2b127b26fdba490f677615b4af49c3fbeb4ce60029f2c73bb74888e2eef5

  • C:\Users\Admin\AppData\Roaming\Z11062600\Corona-virus-Map.com.exe
    MD5

    07b819b4d602635365e361b96749ac3e

    SHA1

    7664716cc5097a97415c4d22ccb558dfcb139020

    SHA256

    203c7e843936469ecf0f5dec989d690b0c770f803e46062ad0a9885a1105a2b8

    SHA512

    83e67fe87870b1b8b53fd909e7272d4b4995e00c7d446b19f4a29a59b3d29ce5c73da3446290e71d36c73e922c473a18ced25706c2bd69ef82c2cf841d938555

  • C:\Users\Admin\AppData\Roaming\Z11062600\Corona-virus-Map.com.exe
    MD5

    07b819b4d602635365e361b96749ac3e

    SHA1

    7664716cc5097a97415c4d22ccb558dfcb139020

    SHA256

    203c7e843936469ecf0f5dec989d690b0c770f803e46062ad0a9885a1105a2b8

    SHA512

    83e67fe87870b1b8b53fd909e7272d4b4995e00c7d446b19f4a29a59b3d29ce5c73da3446290e71d36c73e922c473a18ced25706c2bd69ef82c2cf841d938555

  • C:\Users\Admin\AppData\Roaming\Z11062600\Corona.exe
    MD5

    1beba1640f5573cbac5552ae02c38f33

    SHA1

    6878e9825fad4696e48aca151e656a4581e3dc16

    SHA256

    0b3e7faa3ad28853bb2b2ef188b310a67663a96544076cd71c32ac088f9af74d

    SHA512

    b7404b3f0a0e1fcc020557b27821a63c19ffe006407051645abaf32b3881e89661f729e4c2c94e068ea16fbfc97f7a6c3be9387bd8d745e8eec9d288b3f8a381

  • C:\Users\Admin\AppData\Roaming\Z11062600\Corona.exe
    MD5

    1beba1640f5573cbac5552ae02c38f33

    SHA1

    6878e9825fad4696e48aca151e656a4581e3dc16

    SHA256

    0b3e7faa3ad28853bb2b2ef188b310a67663a96544076cd71c32ac088f9af74d

    SHA512

    b7404b3f0a0e1fcc020557b27821a63c19ffe006407051645abaf32b3881e89661f729e4c2c94e068ea16fbfc97f7a6c3be9387bd8d745e8eec9d288b3f8a381

  • C:\Users\Admin\AppData\Roaming\Z58538177\Build.exe
    MD5

    f6a5e02f46d761d3890debd8f2084d37

    SHA1

    d64ff51020046fb13aec3ed608ba499295caf80d

    SHA256

    126569286f8a4caeeaba372c0bdba93a9b0639beaad9c250b8223f8ecc1e8040

    SHA512

    a3563460ce90c04da9e498081d68a9e3dc0ef25dccd21330e60f0617455aa4f839ba127d69e8043111fcb3912a44ef10eb53b0baaabad7bdf6f691f5842bff31

  • C:\Users\Admin\AppData\Roaming\Z58538177\Build.exe
    MD5

    f6a5e02f46d761d3890debd8f2084d37

    SHA1

    d64ff51020046fb13aec3ed608ba499295caf80d

    SHA256

    126569286f8a4caeeaba372c0bdba93a9b0639beaad9c250b8223f8ecc1e8040

    SHA512

    a3563460ce90c04da9e498081d68a9e3dc0ef25dccd21330e60f0617455aa4f839ba127d69e8043111fcb3912a44ef10eb53b0baaabad7bdf6f691f5842bff31

  • C:\Users\Admin\AppData\Roaming\Z58538177\bin.exe
    MD5

    c4852ee6589252c601bc2922a35dd7da

    SHA1

    4c8a7c3dabf12748201c496525a37ec65577cbbb

    SHA256

    fda64c0ac9be3d10c28035d12ac0f63d85bb0733e78fe634a51474c83d0a0df8

    SHA512

    d144cb9bd81118d853e831f4890c4f32b9c5d59fd5188fca4056670263c6315481d406fc8ec31347db0b0d226a57f3fcc003f5d73591ed5f04c4f6c9a67a65dd

  • C:\Users\Admin\AppData\Roaming\Z58538177\bin.exe
    MD5

    c4852ee6589252c601bc2922a35dd7da

    SHA1

    4c8a7c3dabf12748201c496525a37ec65577cbbb

    SHA256

    fda64c0ac9be3d10c28035d12ac0f63d85bb0733e78fe634a51474c83d0a0df8

    SHA512

    d144cb9bd81118d853e831f4890c4f32b9c5d59fd5188fca4056670263c6315481d406fc8ec31347db0b0d226a57f3fcc003f5d73591ed5f04c4f6c9a67a65dd

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\1\Information.txt
    MD5

    1eadea0c1176a5116d5bae4f33652999

    SHA1

    760526257ba84de8cf20f43cfeccca8b69df8625

    SHA256

    6d91c3a02474f4346512973bac503332c8bec105d4ee31255674e26b7d25b7b5

    SHA512

    fd7fc0947c306da849a0e20699ccf65b397affd48764ab5497f9fb6dec1d7a948ba2a8633ef613b404eac9877d52f3ddd73742963df28b601d1306df3b9b2a7f

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\1\Screen.jpg
    MD5

    36022d73969e951df8cecbecbdeba4fe

    SHA1

    fe403ccff62d6908378a598293e6d43fec8cb7e3

    SHA256

    e1faa24b3b397c6f5002bf966d9e5d668c6fae6b348ad62ea337a2f4039a4da2

    SHA512

    94703056ccb2b6c479ba069900131e233d34b4960d5411c2fb1df22f83425009a054da0b53f50090b849959edbd6627a6e573f9ef4b76a3d4a36c45e6454757f

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\ENU_801FE97C2665CBDE9D41
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\ENU_801FE97C2665CBDE9D41.7z
    MD5

    db26edbfcf63428cb6e7524535a4e099

    SHA1

    47c8939e3e9199259f5d940db414ad64f45c7878

    SHA256

    535d302e173637c8d1f12ac376ce9aab52c3a98040faca6f96b48a9a5df2f7b3

    SHA512

    82d56020124e91bc9939a7ea5f571158e8f79eb068832232d15ff403891527a5baf1fe6486c00e66c7d4118eb57a88952865bb0d152c181f5a7f5aa0a57c4fb6

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
    MD5

    f6a5e02f46d761d3890debd8f2084d37

    SHA1

    d64ff51020046fb13aec3ed608ba499295caf80d

    SHA256

    126569286f8a4caeeaba372c0bdba93a9b0639beaad9c250b8223f8ecc1e8040

    SHA512

    a3563460ce90c04da9e498081d68a9e3dc0ef25dccd21330e60f0617455aa4f839ba127d69e8043111fcb3912a44ef10eb53b0baaabad7bdf6f691f5842bff31

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
    MD5

    f6a5e02f46d761d3890debd8f2084d37

    SHA1

    d64ff51020046fb13aec3ed608ba499295caf80d

    SHA256

    126569286f8a4caeeaba372c0bdba93a9b0639beaad9c250b8223f8ecc1e8040

    SHA512

    a3563460ce90c04da9e498081d68a9e3dc0ef25dccd21330e60f0617455aa4f839ba127d69e8043111fcb3912a44ef10eb53b0baaabad7bdf6f691f5842bff31

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
    MD5

    f6a5e02f46d761d3890debd8f2084d37

    SHA1

    d64ff51020046fb13aec3ed608ba499295caf80d

    SHA256

    126569286f8a4caeeaba372c0bdba93a9b0639beaad9c250b8223f8ecc1e8040

    SHA512

    a3563460ce90c04da9e498081d68a9e3dc0ef25dccd21330e60f0617455aa4f839ba127d69e8043111fcb3912a44ef10eb53b0baaabad7bdf6f691f5842bff31

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe
    MD5

    946285055913d457fda78a4484266e96

    SHA1

    668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285

    SHA256

    23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb

    SHA512

    30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe
    MD5

    946285055913d457fda78a4484266e96

    SHA1

    668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285

    SHA256

    23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb

    SHA512

    30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

  • \Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.sqlite3.module.dll
    MD5

    8c127ce55bfbb55eb9a843c693c9f240

    SHA1

    75c462c935a7ff2c90030c684440d61d48bb1858

    SHA256

    4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028

    SHA512

    d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

  • \Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.sqlite3.module.dll
    MD5

    8c127ce55bfbb55eb9a843c693c9f240

    SHA1

    75c462c935a7ff2c90030c684440d61d48bb1858

    SHA256

    4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028

    SHA512

    d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

  • memory/188-20-0x0000000000000000-mapping.dmp
  • memory/196-49-0x0000000000000000-mapping.dmp
  • memory/500-27-0x0000000000000000-mapping.dmp
  • memory/728-11-0x0000000000000000-mapping.dmp
  • memory/2140-13-0x0000000000000000-mapping.dmp
  • memory/2332-23-0x0000000000000000-mapping.dmp
  • memory/2660-0-0x0000000000000000-mapping.dmp
  • memory/2840-42-0x0000000000000000-mapping.dmp
  • memory/3324-2-0x0000000000000000-mapping.dmp
  • memory/3324-15-0x00000000049A0000-0x00000000049A1000-memory.dmp
    Filesize

    4KB

  • memory/3324-6-0x0000000073420000-0x0000000073B0E000-memory.dmp
    Filesize

    6.9MB

  • memory/3324-8-0x0000000000100000-0x0000000000101000-memory.dmp
    Filesize

    4KB

  • memory/3324-10-0x0000000004F80000-0x0000000004F81000-memory.dmp
    Filesize

    4KB

  • memory/3324-41-0x000000000A780000-0x000000000A781000-memory.dmp
    Filesize

    4KB

  • memory/3324-26-0x0000000004A50000-0x0000000004A51000-memory.dmp
    Filesize

    4KB

  • memory/3696-17-0x0000000000000000-mapping.dmp