Analysis

  • max time kernel
    43s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    08-05-2021 17:06

General

  • Target

    9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe

  • Size

    1.9MB

  • MD5

    adac3b4cb7f7e8280652146c5893afda

  • SHA1

    841a987a4ea28e602fcde17494522544678eed25

  • SHA256

    9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76

  • SHA512

    2264bf73d07f1a0b9501a6a648d0dc35265195542da882e79dcee6fae6797ed2f4cf0f6b74e38ede24e61ad4e70e95efd60110460d31fe9149500a61c2ddcf29

Malware Config

Extracted

Family

azorult

C2

http://work.wrklantc.in:9050/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe
    "C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\h21vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\h21vnc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
        • Maps connected drives based on registry
        PID:1092
    • C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe
      "C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe"
      2⤵
        PID:752
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn amsi /tr "C:\Users\Admin\slui\comp.exe" /sc minute /mo 1 /F
        2⤵
        • Creates scheduled task(s)
        PID:1552
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {2E4B6A07-F12A-4C39-8852-39A5A4472EDE} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]
      1⤵
        PID:1056
        • C:\Users\Admin\slui\comp.exe
          C:\Users\Admin\slui\comp.exe
          2⤵
            PID:2012
          • C:\Users\Admin\slui\comp.exe
            C:\Users\Admin\slui\comp.exe
            2⤵
              PID:1708

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Discovery

          Query Registry

          2
          T1012

          Peripheral Device Discovery

          2
          T1120

          System Information Discovery

          3
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\h21vnc.exe
            MD5

            2aa5b4a93c2ccd200e4d97a64b84aefb

            SHA1

            85934cf71fa56f27789686b7ed6db9b82f6417c1

            SHA256

            bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

            SHA512

            f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

          • C:\Users\Admin\slui\comp.exe
            MD5

            8918116474ac3bd6aa1ff158f183775a

            SHA1

            178d58e62088ee57d62e9d9445d1091963b5b229

            SHA256

            7f8f394e8e3d5da9a675263e3b50919ff8b59a6ece4285893329cd83cf5008dd

            SHA512

            3351d2d1f93bb9c6743631f3d0349c50fc801c10e92f340f3b7b7a6f2114d381ea2b9dda7a5bec447e966cbd04168a4b10684214ab39cd10829892e910e9104b

          • C:\Users\Admin\slui\comp.exe
            MD5

            8918116474ac3bd6aa1ff158f183775a

            SHA1

            178d58e62088ee57d62e9d9445d1091963b5b229

            SHA256

            7f8f394e8e3d5da9a675263e3b50919ff8b59a6ece4285893329cd83cf5008dd

            SHA512

            3351d2d1f93bb9c6743631f3d0349c50fc801c10e92f340f3b7b7a6f2114d381ea2b9dda7a5bec447e966cbd04168a4b10684214ab39cd10829892e910e9104b

          • C:\Users\Admin\slui\comp.exe
            MD5

            8918116474ac3bd6aa1ff158f183775a

            SHA1

            178d58e62088ee57d62e9d9445d1091963b5b229

            SHA256

            7f8f394e8e3d5da9a675263e3b50919ff8b59a6ece4285893329cd83cf5008dd

            SHA512

            3351d2d1f93bb9c6743631f3d0349c50fc801c10e92f340f3b7b7a6f2114d381ea2b9dda7a5bec447e966cbd04168a4b10684214ab39cd10829892e910e9104b

          • \Users\Admin\AppData\Local\Temp\h21vnc.exe
            MD5

            2aa5b4a93c2ccd200e4d97a64b84aefb

            SHA1

            85934cf71fa56f27789686b7ed6db9b82f6417c1

            SHA256

            bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

            SHA512

            f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

          • \Users\Admin\AppData\Local\Temp\h21vnc.exe
            MD5

            2aa5b4a93c2ccd200e4d97a64b84aefb

            SHA1

            85934cf71fa56f27789686b7ed6db9b82f6417c1

            SHA256

            bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

            SHA512

            f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

          • \Users\Admin\AppData\Local\Temp\h21vnc.exe
            MD5

            2aa5b4a93c2ccd200e4d97a64b84aefb

            SHA1

            85934cf71fa56f27789686b7ed6db9b82f6417c1

            SHA256

            bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

            SHA512

            f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

          • \Users\Admin\AppData\Local\Temp\h21vnc.exe
            MD5

            2aa5b4a93c2ccd200e4d97a64b84aefb

            SHA1

            85934cf71fa56f27789686b7ed6db9b82f6417c1

            SHA256

            bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

            SHA512

            f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

          • memory/740-64-0x0000000000000000-mapping.dmp
          • memory/752-68-0x0000000000080000-0x00000000000A0000-memory.dmp
            Filesize

            128KB

          • memory/752-72-0x000000000009A1F8-mapping.dmp
          • memory/1092-67-0x0000000000000000-mapping.dmp
          • memory/1092-75-0x0000000000020000-0x0000000000021000-memory.dmp
            Filesize

            4KB

          • memory/1092-76-0x00000000003A0000-0x000000000043C000-memory.dmp
            Filesize

            624KB

          • memory/1552-77-0x0000000000000000-mapping.dmp
          • memory/1708-82-0x0000000000000000-mapping.dmp
          • memory/2012-79-0x0000000000000000-mapping.dmp
          • memory/2040-74-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
            Filesize

            4KB

          • memory/2040-59-0x0000000076281000-0x0000000076283000-memory.dmp
            Filesize

            8KB