Analysis
-
max time kernel
10s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-05-2021 19:43
Static task
static1
Behavioral task
behavioral1
Sample
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe
Resource
win10v20210408
General
-
Target
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe
-
Size
2.0MB
-
MD5
ee10d726a9123b07636a78002ec3a42a
-
SHA1
c7a441329edaf491c897f557ad51d3b07a093e3a
-
SHA256
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986
-
SHA512
f4191053278977cb4754cc2dda4c37463dc7b3a45a192841c6d9b212b107dfb3afdbbe6e9e88a1a3bd04d595e36bc84b7022bf8ce4109f88e3fa37b527b652ea
Malware Config
Extracted
azorult
http://0x21.in:8000/_az/
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
vnc.exewindef.exepid process 3784 vnc.exe 3480 windef.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exedescription ioc process File opened (read-only) \??\a: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\e: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\g: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\r: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\v: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\w: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\y: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\f: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\i: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\l: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\m: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\p: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\q: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\b: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\k: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\u: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\z: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\x: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\h: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\j: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\n: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\o: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\s: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe File opened (read-only) \??\t: 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exevnc.exedescription pid process target process PID 604 set thread context of 3396 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe PID 3784 set thread context of 3292 3784 vnc.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3220 3896 WerFault.exe winsock.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 200 schtasks.exe 2112 schtasks.exe 2908 schtasks.exe 3220 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exepid process 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
vnc.exepid process 3784 vnc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exevnc.exedescription pid process target process PID 604 wrote to memory of 3784 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe vnc.exe PID 604 wrote to memory of 3784 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe vnc.exe PID 604 wrote to memory of 3784 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe vnc.exe PID 3784 wrote to memory of 3292 3784 vnc.exe svchost.exe PID 3784 wrote to memory of 3292 3784 vnc.exe svchost.exe PID 604 wrote to memory of 3480 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe windef.exe PID 604 wrote to memory of 3480 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe windef.exe PID 604 wrote to memory of 3480 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe windef.exe PID 604 wrote to memory of 3396 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe PID 604 wrote to memory of 3396 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe PID 604 wrote to memory of 3396 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe PID 604 wrote to memory of 3396 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe PID 604 wrote to memory of 3396 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe PID 3784 wrote to memory of 3292 3784 vnc.exe svchost.exe PID 604 wrote to memory of 200 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe schtasks.exe PID 604 wrote to memory of 200 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe schtasks.exe PID 604 wrote to memory of 200 604 5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe schtasks.exe PID 3784 wrote to memory of 3292 3784 vnc.exe svchost.exe PID 3784 wrote to memory of 3292 3784 vnc.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe"C:\Users\Admin\AppData\Local\Temp\5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵
- Maps connected drives based on registry
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2112
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:3896
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:2908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NaB3wSneH8TA.bat" "4⤵PID:1348
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:2248
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:3904
-
-
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:3984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 19164⤵
- Program crash
PID:3220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe"C:\Users\Admin\AppData\Local\Temp\5731b7144118616dcd213b4bfd7e001b3bb101077ea1100361b519d72fdec986.exe"2⤵PID:3396
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:200
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:3308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:512
-
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵PID:2160
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
PID:3220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1efce85e583a7a2f123317a20f889d04
SHA160f71aa73ea2e2a48ed1c17e3c6d440abf39c914
SHA2562b5532a94879134a876b11c188ade1a61deaba6a80fe1f3a3a77cc442f1cca0d
SHA51245a5cd283e6a6ac34c3d8b1a6d73dc1cf52d8c974cf84624e8e9924eddaf354ccda929bce728b47db2b62175e47bdc3eaca6bc6b84d3565881fa87c50319d24c
-
MD5
bfe8046e3d3aeab19ebf9b5b44eba9ad
SHA170169c2417d17cb49d0d01e5860c2cba274878cd
SHA256cf79ed9f3c41e1b0328536e56434bfc03b605fa36df378a81f7837b202738e41
SHA512b41153cf2390d6d741052f1e3df62d7a82770da2c4bd42adb871703ea87df7b4aa4c9c78ff0185c9b47abe0e93e08785242eff10d5f795103a18f9685c1317fa
-
MD5
b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
MD5
b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
MD5
b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
MD5
b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
MD5
b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
MD5
b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
MD5
b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
MD5
b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
MD5
b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
MD5
b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
MD5
d973d43767a90abb13aec766197d13d2
SHA1690fd04529c25ee42c508b9601e38e9d9e4071ce
SHA25661bc1a41b735052fea9726eb1030fcd7dbe841c1083a0bfd4430d84b055c9369
SHA5122010b42cf46efed37dfa0caab3ac0be335d328e87ab7e7db3ab5ede58d505993ed257473c3dda880f9ffd223ceed06c1f40c8250c036c44a2a7cbae8c4b880e8
-
MD5
d973d43767a90abb13aec766197d13d2
SHA1690fd04529c25ee42c508b9601e38e9d9e4071ce
SHA25661bc1a41b735052fea9726eb1030fcd7dbe841c1083a0bfd4430d84b055c9369
SHA5122010b42cf46efed37dfa0caab3ac0be335d328e87ab7e7db3ab5ede58d505993ed257473c3dda880f9ffd223ceed06c1f40c8250c036c44a2a7cbae8c4b880e8
-
MD5
d973d43767a90abb13aec766197d13d2
SHA1690fd04529c25ee42c508b9601e38e9d9e4071ce
SHA25661bc1a41b735052fea9726eb1030fcd7dbe841c1083a0bfd4430d84b055c9369
SHA5122010b42cf46efed37dfa0caab3ac0be335d328e87ab7e7db3ab5ede58d505993ed257473c3dda880f9ffd223ceed06c1f40c8250c036c44a2a7cbae8c4b880e8