Analysis

  • max time kernel
    49s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    08-05-2021 17:06

General

  • Target

    9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe

  • Size

    1.9MB

  • MD5

    adac3b4cb7f7e8280652146c5893afda

  • SHA1

    841a987a4ea28e602fcde17494522544678eed25

  • SHA256

    9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76

  • SHA512

    2264bf73d07f1a0b9501a6a648d0dc35265195542da882e79dcee6fae6797ed2f4cf0f6b74e38ede24e61ad4e70e95efd60110460d31fe9149500a61c2ddcf29

Malware Config

Extracted

Family

azorult

C2

http://work.wrklantc.in:9050/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe
    "C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\AppData\Local\Temp\h21vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\h21vnc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
        • Maps connected drives based on registry
        PID:584
    • C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe
      "C:\Users\Admin\AppData\Local\Temp\9fd1b6bb492b8ddf71e4dd57561772160e28de0c7dc10257ce3c6d6c1e506f76.exe"
      2⤵
        PID:2752
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn amsi /tr "C:\Users\Admin\slui\comp.exe" /sc minute /mo 1 /F
        2⤵
        • Creates scheduled task(s)
        PID:3880
    • C:\Users\Admin\slui\comp.exe
      C:\Users\Admin\slui\comp.exe
      1⤵
        PID:3972
      • C:\Users\Admin\slui\comp.exe
        C:\Users\Admin\slui\comp.exe
        1⤵
          PID:4092

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Discovery

        Query Registry

        2
        T1012

        Peripheral Device Discovery

        2
        T1120

        System Information Discovery

        3
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\h21vnc.exe
          MD5

          2aa5b4a93c2ccd200e4d97a64b84aefb

          SHA1

          85934cf71fa56f27789686b7ed6db9b82f6417c1

          SHA256

          bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

          SHA512

          f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

        • C:\Users\Admin\AppData\Local\Temp\h21vnc.exe
          MD5

          2aa5b4a93c2ccd200e4d97a64b84aefb

          SHA1

          85934cf71fa56f27789686b7ed6db9b82f6417c1

          SHA256

          bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

          SHA512

          f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

        • C:\Users\Admin\slui\comp.exe
          MD5

          a045fc51434dcffe041d43acdcd932c2

          SHA1

          f4894a3e1d981b253fca4922c5f74e25fa975f5d

          SHA256

          c04ba26500e994f323fb762b7913edd8ddc483f05a7818e118e40cba0bd887ad

          SHA512

          b7f11aabb1557c6de3ce3550007bcb7943b4233ebaf7ade7e7036955a1259d27b4cf71544bd5787479dffca4dc6f6bda63a11be04c519a4266dfa77357a64203

        • C:\Users\Admin\slui\comp.exe
          MD5

          a045fc51434dcffe041d43acdcd932c2

          SHA1

          f4894a3e1d981b253fca4922c5f74e25fa975f5d

          SHA256

          c04ba26500e994f323fb762b7913edd8ddc483f05a7818e118e40cba0bd887ad

          SHA512

          b7f11aabb1557c6de3ce3550007bcb7943b4233ebaf7ade7e7036955a1259d27b4cf71544bd5787479dffca4dc6f6bda63a11be04c519a4266dfa77357a64203

        • C:\Users\Admin\slui\comp.exe
          MD5

          a045fc51434dcffe041d43acdcd932c2

          SHA1

          f4894a3e1d981b253fca4922c5f74e25fa975f5d

          SHA256

          c04ba26500e994f323fb762b7913edd8ddc483f05a7818e118e40cba0bd887ad

          SHA512

          b7f11aabb1557c6de3ce3550007bcb7943b4233ebaf7ade7e7036955a1259d27b4cf71544bd5787479dffca4dc6f6bda63a11be04c519a4266dfa77357a64203

        • memory/584-122-0x0000000000000000-mapping.dmp
        • memory/584-124-0x0000000000C30000-0x0000000000C31000-memory.dmp
          Filesize

          4KB

        • memory/584-125-0x0000000000B90000-0x0000000000C2C000-memory.dmp
          Filesize

          624KB

        • memory/736-123-0x0000000001640000-0x0000000001641000-memory.dmp
          Filesize

          4KB

        • memory/2252-114-0x0000000000000000-mapping.dmp
        • memory/2752-117-0x0000000000400000-0x0000000000420000-memory.dmp
          Filesize

          128KB

        • memory/2752-121-0x000000000041A1F8-mapping.dmp
        • memory/3880-126-0x0000000000000000-mapping.dmp