Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-04-2021 10:04

General

  • Target

    04721BFDE5ECE7D75CE90D7D09DDCC71028B26F229038.exe

  • Size

    231KB

  • MD5

    0a1c0441a4b383a7c91bb3a0b2036b20

  • SHA1

    cc32f97cdd7389e4857ca508a4b598831f6c7fd3

  • SHA256

    04721bfde5ece7d75ce90d7d09ddcc71028b26f2290382ffb78efcb2c436b2b6

  • SHA512

    faa4b15dc354c966dd9447ed52cf94964b224c4b30bb9692706af119e2e6936a2e6188b7cc3743129aeb80db96ecd18573a860fe2ea6fd4bbc3c37af4e09de14

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04721BFDE5ECE7D75CE90D7D09DDCC71028B26F229038.exe
    "C:\Users\Admin\AppData\Local\Temp\04721BFDE5ECE7D75CE90D7D09DDCC71028B26F229038.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Users\Admin\AppData\Local\Temp\XD.exe
      "C:\Users\Admin\AppData\Local\Temp\XD.exe"
      2⤵
      • Executes dropped EXE
      PID:508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1224
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2700
    • C:\Users\Admin\AppData\Local\Temp\GuMonSet32.exe
      "C:\Users\Admin\AppData\Local\Temp\GuMonSet32.exe"
      2⤵
      • Executes dropped EXE
      PID:2556

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GuMonSet32.exe
    MD5

    0ee8839051ff9c7c2699c3d80043eaa7

    SHA1

    77ead602300e8f2556601e30bab65b4eec5cf527

    SHA256

    a92f119736413ecdc6d764112f57dfeee6c7f5b8cc2ec4c9e235af08cb11b771

    SHA512

    a5210f5fef07ef47a703e7f63842f8f93d7115f3c375d5a2812975f03d58c9a31cf24fc9e9afe47f501a732b7640146d945ce302f9c67dbad4d84311143de9df

  • C:\Users\Admin\AppData\Local\Temp\GuMonSet32.exe
    MD5

    0ee8839051ff9c7c2699c3d80043eaa7

    SHA1

    77ead602300e8f2556601e30bab65b4eec5cf527

    SHA256

    a92f119736413ecdc6d764112f57dfeee6c7f5b8cc2ec4c9e235af08cb11b771

    SHA512

    a5210f5fef07ef47a703e7f63842f8f93d7115f3c375d5a2812975f03d58c9a31cf24fc9e9afe47f501a732b7640146d945ce302f9c67dbad4d84311143de9df

  • C:\Users\Admin\AppData\Local\Temp\XD.exe
    MD5

    96fb8d393302d80b87fc5871102e9125

    SHA1

    234a809d5b9ada6b911fbe3846f55c4748cb46a0

    SHA256

    4a92cd9b845b492b6ba216b85dab28421111d7bbe9f31e857a767cb6fefb09a5

    SHA512

    46b704f5daa16002849b0473991810e5eb483e3a3ffc2fee3ad38f3f2218296dba48a19fec65aa24f81371d1068b191f30f642cc7304d6f30cb68e4fdee966dd

  • C:\Users\Admin\AppData\Local\Temp\XD.exe
    MD5

    96fb8d393302d80b87fc5871102e9125

    SHA1

    234a809d5b9ada6b911fbe3846f55c4748cb46a0

    SHA256

    4a92cd9b845b492b6ba216b85dab28421111d7bbe9f31e857a767cb6fefb09a5

    SHA512

    46b704f5daa16002849b0473991810e5eb483e3a3ffc2fee3ad38f3f2218296dba48a19fec65aa24f81371d1068b191f30f642cc7304d6f30cb68e4fdee966dd

  • memory/508-114-0x0000000000000000-mapping.dmp
  • memory/2556-117-0x0000000000000000-mapping.dmp