Analysis
-
max time kernel
61s -
max time network
63s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-04-2021 05:12
Static task
static1
Behavioral task
behavioral1
Sample
Kyodai_Mahjongg_2006_1_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Kyodai_Mahjongg_2006_1_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Kyodai_Mahjongg_2006_1_keygen.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Kyodai_Mahjongg_2006_1_keygen.exe
Resource
win10v20201028
General
-
Target
Kyodai_Mahjongg_2006_1_keygen.exe
-
Size
5.2MB
-
MD5
a438d3b681e5250cad13ffbc5a8b1e5f
-
SHA1
e8106fabc033378b3644aa34b815147a77b83539
-
SHA256
297d988321fbbbadd950e60e649f2252049e4380b5824594113ea34c13a41410
-
SHA512
9727bbfc48c98c6caab97bf782122dd18e0cad567a1e7010a827086fc2db91abe85eb23e2cab7c538d9f7f2ffc3ee37463f3ed4c46b329800d76b8b650673c40
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
XMRig Miner Payload 4 IoCs
resource yara_rule behavioral1/memory/4056-152-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/4056-153-0x00000001402CA898-mapping.dmp xmrig behavioral1/memory/4056-155-0x0000000140000000-0x000000014070A000-memory.dmp xmrig behavioral1/memory/4056-157-0x0000000140000000-0x000000014070A000-memory.dmp xmrig -
Executes dropped EXE 7 IoCs
pid Process 4024 keygen-pr.exe 2128 keygen-step-1.exe 3256 keygen-step-3.exe 752 keygen-step-4.exe 2508 key.exe 2808 Setup.exe 3996 key.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 99 ipinfo.io 101 ipinfo.io -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2508 set thread context of 3996 2508 key.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 3596 taskkill.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5364 PING.EXE 4456 PING.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 100 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 Setup.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4700 wrote to memory of 1020 4700 Kyodai_Mahjongg_2006_1_keygen.exe 75 PID 4700 wrote to memory of 1020 4700 Kyodai_Mahjongg_2006_1_keygen.exe 75 PID 4700 wrote to memory of 1020 4700 Kyodai_Mahjongg_2006_1_keygen.exe 75 PID 1020 wrote to memory of 4024 1020 cmd.exe 78 PID 1020 wrote to memory of 4024 1020 cmd.exe 78 PID 1020 wrote to memory of 4024 1020 cmd.exe 78 PID 1020 wrote to memory of 2128 1020 cmd.exe 79 PID 1020 wrote to memory of 2128 1020 cmd.exe 79 PID 1020 wrote to memory of 2128 1020 cmd.exe 79 PID 1020 wrote to memory of 3256 1020 cmd.exe 80 PID 1020 wrote to memory of 3256 1020 cmd.exe 80 PID 1020 wrote to memory of 3256 1020 cmd.exe 80 PID 1020 wrote to memory of 752 1020 cmd.exe 81 PID 1020 wrote to memory of 752 1020 cmd.exe 81 PID 1020 wrote to memory of 752 1020 cmd.exe 81 PID 4024 wrote to memory of 2508 4024 keygen-pr.exe 82 PID 4024 wrote to memory of 2508 4024 keygen-pr.exe 82 PID 4024 wrote to memory of 2508 4024 keygen-pr.exe 82 PID 752 wrote to memory of 2808 752 keygen-step-4.exe 83 PID 752 wrote to memory of 2808 752 keygen-step-4.exe 83 PID 3256 wrote to memory of 3792 3256 keygen-step-3.exe 84 PID 3256 wrote to memory of 3792 3256 keygen-step-3.exe 84 PID 3256 wrote to memory of 3792 3256 keygen-step-3.exe 84 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 2508 wrote to memory of 3996 2508 key.exe 87 PID 3792 wrote to memory of 4456 3792 cmd.exe 88 PID 3792 wrote to memory of 4456 3792 cmd.exe 88 PID 3792 wrote to memory of 4456 3792 cmd.exe 88 PID 2808 wrote to memory of 4420 2808 Setup.exe 89 PID 2808 wrote to memory of 4420 2808 Setup.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kyodai_Mahjongg_2006_1_keygen.exe"C:\Users\Admin\AppData\Local\Temp\Kyodai_Mahjongg_2006_1_keygen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:3996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\25XAD1NRVX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\25XAD1NRVX\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\25XAD1NRVX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\25XAD1NRVX\multitimer.exe" 1 3.1617513327.60694b6f9a691 1016⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\25XAD1NRVX\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\25XAD1NRVX\multitimer.exe" 2 3.1617513327.60694b6f9a6917⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\qfdf3zgy1fc\Setup3310.exe"C:\Users\Admin\AppData\Local\Temp\qfdf3zgy1fc\Setup3310.exe" /Verysilent /subid=5778⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\is-PC8MK.tmp\Setup3310.tmp"C:\Users\Admin\AppData\Local\Temp\is-PC8MK.tmp\Setup3310.tmp" /SL5="$30210,138429,56832,C:\Users\Admin\AppData\Local\Temp\qfdf3zgy1fc\Setup3310.exe" /Verysilent /subid=5779⤵PID:5236
-
-
-
C:\Users\Admin\AppData\Local\Temp\pxodrlmtpzu\mmfjpe41i3i.exe"C:\Users\Admin\AppData\Local\Temp\pxodrlmtpzu\mmfjpe41i3i.exe" /VERYSILENT8⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\is-SSFIB.tmp\mmfjpe41i3i.tmp"C:\Users\Admin\AppData\Local\Temp\is-SSFIB.tmp\mmfjpe41i3i.tmp" /SL5="$40298,2592217,780800,C:\Users\Admin\AppData\Local\Temp\pxodrlmtpzu\mmfjpe41i3i.exe" /VERYSILENT9⤵PID:5300
-
-
-
C:\Users\Admin\AppData\Local\Temp\nx033zm4wmt\y1zmr2pndlt.exe"C:\Users\Admin\AppData\Local\Temp\nx033zm4wmt\y1zmr2pndlt.exe" /ustwo INSTALL8⤵PID:5244
-
-
C:\Users\Admin\AppData\Local\Temp\hhivrkbjzh5\ey4wttcxb5r.exe"C:\Users\Admin\AppData\Local\Temp\hhivrkbjzh5\ey4wttcxb5r.exe"8⤵PID:5436
-
-
C:\Users\Admin\AppData\Local\Temp\4pn1n2eg2bj\app.exe"C:\Users\Admin\AppData\Local\Temp\4pn1n2eg2bj\app.exe" /8-238⤵PID:5528
-
-
C:\Users\Admin\AppData\Local\Temp\yoip4boasde\cpyrix.exe"C:\Users\Admin\AppData\Local\Temp\yoip4boasde\cpyrix.exe" /VERYSILENT8⤵PID:5628
-
-
C:\Users\Admin\AppData\Local\Temp\pefnzujxmqh\IBInstaller_97039.exe"C:\Users\Admin\AppData\Local\Temp\pefnzujxmqh\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq8⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\is-S3T38.tmp\IBInstaller_97039.tmp"C:\Users\Admin\AppData\Local\Temp\is-S3T38.tmp\IBInstaller_97039.tmp" /SL5="$202C2,14575144,721408,C:\Users\Admin\AppData\Local\Temp\pefnzujxmqh\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq9⤵PID:5768
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-NUDD8.tmp\{app}\microsoft.cab -F:* %ProgramData%10⤵PID:5988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4pcensitr4y\vict.exe"C:\Users\Admin\AppData\Local\Temp\4pcensitr4y\vict.exe" /VERYSILENT /id=5358⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\is-GE2D0.tmp\vict.tmp"C:\Users\Admin\AppData\Local\Temp\is-GE2D0.tmp\vict.tmp" /SL5="$103D2,870426,780800,C:\Users\Admin\AppData\Local\Temp\4pcensitr4y\vict.exe" /VERYSILENT /id=5359⤵PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\lmpt1rdfh35\xim3vmpkxej.exe"C:\Users\Admin\AppData\Local\Temp\lmpt1rdfh35\xim3vmpkxej.exe" /quiet SILENT=1 AF=7568⤵PID:412
-
-
C:\Users\Admin\AppData\Local\Temp\5jnznyv4fcu\vpn.exe"C:\Users\Admin\AppData\Local\Temp\5jnznyv4fcu\vpn.exe" /silent /subid=4828⤵PID:68
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PQCUQ8XRU0\setups.exe"C:\Users\Admin\AppData\Local\Temp\PQCUQ8XRU0\setups.exe" ll5⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\is-EJ6MR.tmp\setups.tmp"C:\Users\Admin\AppData\Local\Temp\is-EJ6MR.tmp\setups.tmp" /SL5="$400C8,635399,250368,C:\Users\Admin\AppData\Local\Temp\PQCUQ8XRU0\setups.exe" ll6⤵PID:3796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"4⤵PID:1824
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe5⤵PID:4732
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe6⤵
- Kills process with taskkill
PID:3596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full_Version.exe"4⤵PID:1784
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"5⤵PID:2088
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install6⤵PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:3804
-
C:\Users\Admin\AppData\Roaming\C52A.tmp.exe"C:\Users\Admin\AppData\Roaming\C52A.tmp.exe"5⤵PID:2100
-
C:\Windows\system32\msiexec.exe-P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 999996⤵PID:1588
-
-
C:\Windows\system32\msiexec.exe-o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 99996⤵PID:4056
-
-
-
C:\Users\Admin\AppData\Roaming\C981.tmp.exe"C:\Users\Admin\AppData\Roaming\C981.tmp.exe"5⤵PID:4764
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:4012
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:5140
-
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:4140
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:2084
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:4464
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:200
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:4028
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\2319c986b6d14ed5afea00a5bd22a3d0 /t 3096 /p 2001⤵PID:5752
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\7b6b172b9d2a4779a816d2e794a0b2d6 /t 0 /p 40281⤵PID:5908