Analysis
-
max time kernel
59s -
max time network
65s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-03-2021 05:11
Static task
static1
Behavioral task
behavioral1
Sample
Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe
Resource
win7v20201028
General
-
Target
Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe
-
Size
8.6MB
-
MD5
4c5d5630a17759bff9cb25a75a6de902
-
SHA1
7e30a081298ef34a5f7db00607f10c72464e4c96
-
SHA256
45411d2b5bf4e2d0e75af577252aba0a84ccc51e7b05e9b67a54390bb7aab8d8
-
SHA512
09d2a7fa28f88dd5c622b99318a7d68b1c3f9f6fa3edbe589cb067478dba73e790346b967599dde0745e8afeded0096c99d796206f691c34c903c97a01db80f3
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 3 IoCs
pid Process 4052 keygen-pr.exe 4084 keygen-step-1.exe 2056 keygen-step-3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3188 4700 Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe 78 PID 4700 wrote to memory of 3188 4700 Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe 78 PID 4700 wrote to memory of 3188 4700 Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe 78 PID 3188 wrote to memory of 4052 3188 cmd.exe 81 PID 3188 wrote to memory of 4052 3188 cmd.exe 81 PID 3188 wrote to memory of 4052 3188 cmd.exe 81 PID 3188 wrote to memory of 4084 3188 cmd.exe 82 PID 3188 wrote to memory of 4084 3188 cmd.exe 82 PID 3188 wrote to memory of 4084 3188 cmd.exe 82 PID 3188 wrote to memory of 2056 3188 cmd.exe 83 PID 3188 wrote to memory of 2056 3188 cmd.exe 83 PID 3188 wrote to memory of 2056 3188 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe"C:\Users\Admin\AppData\Local\Temp\Raxco.Perfect.Registry.2.0.0.2.key.code.generator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:1776
-
-
-