Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    17s
  • max time network
    50s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04/04/2021, 05:12

General

  • Target

    Lynda_Com_Word_crack.exe

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lynda_Com_Word_crack.exe
    "C:\Users\Admin\AppData\Local\Temp\Lynda_Com_Word_crack.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4040
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
              PID:2148
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
          keygen-step-1.exe
          3⤵
          • Executes dropped EXE
          PID:204
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
          keygen-step-3.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3244
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2128
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              5⤵
              • Runs ping.exe
              PID:2384
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
          keygen-step-4.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3204
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
            4⤵
              PID:1320
              • C:\Users\Admin\AppData\Local\Temp\28GWWF2LON\multitimer.exe
                "C:\Users\Admin\AppData\Local\Temp\28GWWF2LON\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2808
                • C:\Users\Admin\AppData\Local\Temp\28GWWF2LON\multitimer.exe
                  "C:\Users\Admin\AppData\Local\Temp\28GWWF2LON\multitimer.exe" 1 101
                  6⤵
                    PID:4440
                • C:\Users\Admin\AppData\Local\Temp\PTUH9MCLNQ\setups.exe
                  "C:\Users\Admin\AppData\Local\Temp\PTUH9MCLNQ\setups.exe" ll
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2376
                  • C:\Users\Admin\AppData\Local\Temp\is-BQ46D.tmp\setups.tmp
                    "C:\Users\Admin\AppData\Local\Temp\is-BQ46D.tmp\setups.tmp" /SL5="$301D2,635399,250368,C:\Users\Admin\AppData\Local\Temp\PTUH9MCLNQ\setups.exe" ll
                    6⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:3816
              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"
                4⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1444
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c taskkill /f /im chrome.exe
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3148
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1320
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /im chrome.exe
                    6⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1020
              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"
                4⤵
                  PID:4476
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"
                    5⤵
                      PID:4568
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install
                        6⤵
                          PID:4692
                    • C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe
                      "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                      4⤵
                        PID:4612
                        • C:\Users\Admin\AppData\Roaming\9AEE.tmp.exe
                          "C:\Users\Admin\AppData\Roaming\9AEE.tmp.exe"
                          5⤵
                            PID:4604
                            • C:\Windows\system32\msiexec.exe
                              -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
                              6⤵
                                PID:5072
                              • C:\Windows\system32\msiexec.exe
                                -o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 9999
                                6⤵
                                  PID:2984
                              • C:\Users\Admin\AppData\Roaming\9CC3.tmp.exe
                                "C:\Users\Admin\AppData\Roaming\9CC3.tmp.exe"
                                5⤵
                                  PID:4740
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                                  5⤵
                                    PID:1052
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping 127.0.0.1
                                      6⤵
                                      • Runs ping.exe
                                      PID:1972
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"
                                  4⤵
                                    PID:3832
                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                                    "C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe"
                                    4⤵
                                      PID:4220
                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                1⤵
                                • Drops file in Windows directory
                                • Modifies Internet Explorer settings
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:4136
                              • C:\Windows\system32\browser_broker.exe
                                C:\Windows\system32\browser_broker.exe -Embedding
                                1⤵
                                • Modifies Internet Explorer settings
                                PID:4200
                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                1⤵
                                  PID:4456
                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                  1⤵
                                    PID:4704
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k SystemNetworkService
                                    1⤵
                                      PID:4812

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • memory/68-106-0x00000208B9210000-0x00000208B9277000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/1032-114-0x0000022173C00000-0x0000022173C67000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/1048-100-0x000001E9F6EC0000-0x000001E9F6F27000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/1048-73-0x000001E9F6BA0000-0x000001E9F6BE4000-memory.dmp

                                      Filesize

                                      272KB

                                    • memory/1088-112-0x0000029FCF190000-0x0000029FCF1F7000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/1160-120-0x000001B083F10000-0x000001B083F77000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/1320-25-0x00000000009F0000-0x00000000009F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1320-24-0x00007FFA00490000-0x00007FFA00E7C000-memory.dmp

                                      Filesize

                                      9.9MB

                                    • memory/1320-30-0x000000001C060000-0x000000001C062000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/1356-122-0x0000027BBA400000-0x0000027BBA467000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/1384-116-0x000001F3BD110000-0x000001F3BD177000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/1828-118-0x000002064E4D0000-0x000002064E537000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/2376-46-0x0000000000401000-0x000000000040C000-memory.dmp

                                      Filesize

                                      44KB

                                    • memory/2568-108-0x0000028137E40000-0x0000028137EA7000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/2592-110-0x00000225A6C40000-0x00000225A6CA7000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/2692-96-0x0000011F11630000-0x0000011F11697000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/2712-99-0x000001B17F4A0000-0x000001B17F507000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/2808-45-0x0000000002700000-0x0000000002702000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/2808-35-0x00007FF9FC280000-0x00007FF9FCC20000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/2968-102-0x000001E622900000-0x000001E622967000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/2984-138-0x0000000140000000-0x000000014070A000-memory.dmp

                                      Filesize

                                      7.0MB

                                    • memory/2984-140-0x0000011D26AE0000-0x0000011D26AF4000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/2984-149-0x0000011D26B30000-0x0000011D26B50000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2984-142-0x0000000140000000-0x000000014070A000-memory.dmp

                                      Filesize

                                      7.0MB

                                    • memory/2984-141-0x0000000140000000-0x000000014070A000-memory.dmp

                                      Filesize

                                      7.0MB

                                    • memory/3816-50-0x0000000000731000-0x0000000000733000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/3816-47-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3816-54-0x0000000003171000-0x000000000319C000-memory.dmp

                                      Filesize

                                      172KB

                                    • memory/3816-57-0x00000000031B1000-0x00000000031B8000-memory.dmp

                                      Filesize

                                      28KB

                                    • memory/4040-28-0x0000000002BA0000-0x0000000002D3C000-memory.dmp

                                      Filesize

                                      1.6MB

                                    • memory/4220-158-0x0000000000970000-0x0000000000971000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4220-155-0x00007FF9FFE70000-0x00007FFA0085C000-memory.dmp

                                      Filesize

                                      9.9MB

                                    • memory/4220-156-0x0000000000360000-0x0000000000361000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4220-159-0x0000000000980000-0x00000000009A1000-memory.dmp

                                      Filesize

                                      132KB

                                    • memory/4220-160-0x00000000009C0000-0x00000000009C1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4220-161-0x000000001AFB0000-0x000000001AFB2000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/4440-147-0x0000000000B20000-0x0000000000B22000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/4440-145-0x00007FF9FC280000-0x00007FF9FCC20000-memory.dmp

                                      Filesize

                                      9.6MB

                                    • memory/4612-68-0x00000000002E0000-0x00000000002ED000-memory.dmp

                                      Filesize

                                      52KB

                                    • memory/4612-129-0x0000000003740000-0x0000000003788000-memory.dmp

                                      Filesize

                                      288KB

                                    • memory/4692-93-0x0000000004D50000-0x0000000004DA6000-memory.dmp

                                      Filesize

                                      344KB

                                    • memory/4692-91-0x0000000004C40000-0x0000000004C7A000-memory.dmp

                                      Filesize

                                      232KB

                                    • memory/4740-151-0x0000000007570000-0x000000000C9EC000-memory.dmp

                                      Filesize

                                      84.5MB

                                    • memory/4812-104-0x0000021324DF0000-0x0000021324E57000-memory.dmp

                                      Filesize

                                      412KB

                                    • memory/4812-150-0x0000021327400000-0x0000021327505000-memory.dmp

                                      Filesize

                                      1.0MB

                                    • memory/5072-137-0x0000000140000000-0x0000000140383000-memory.dmp

                                      Filesize

                                      3.5MB

                                    • memory/5072-134-0x0000000140000000-0x0000000140383000-memory.dmp

                                      Filesize

                                      3.5MB