Analysis

  • max time kernel
    39s
  • max time network
    8s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09-05-2021 14:30

General

  • Target

    4eaee1f695e6c1b2d9313e2e25796206f3e516a5492318c7309de0e7718d67c2.exe

  • Size

    1.9MB

  • MD5

    be2de5463fff77d33317c926421ba040

  • SHA1

    eea7d85b92d2a2c1fda03364882be19703484ba8

  • SHA256

    4eaee1f695e6c1b2d9313e2e25796206f3e516a5492318c7309de0e7718d67c2

  • SHA512

    bc60e5ae5de7dd13280d39c515065e9b70aaec0a06a7571e38ac2055648f33058e8cdcd2eba1a569b5e60edcbae2d913ff542c6d3571b6d49879ea0f59729fc4

Malware Config

Extracted

Family

azorult

C2

http://work.wrklantc.in:9050/_az/

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eaee1f695e6c1b2d9313e2e25796206f3e516a5492318c7309de0e7718d67c2.exe
    "C:\Users\Admin\AppData\Local\Temp\4eaee1f695e6c1b2d9313e2e25796206f3e516a5492318c7309de0e7718d67c2.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\h21vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\h21vnc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k
        3⤵
        • Maps connected drives based on registry
        PID:1412
    • C:\Users\Admin\AppData\Local\Temp\4eaee1f695e6c1b2d9313e2e25796206f3e516a5492318c7309de0e7718d67c2.exe
      "C:\Users\Admin\AppData\Local\Temp\4eaee1f695e6c1b2d9313e2e25796206f3e516a5492318c7309de0e7718d67c2.exe"
      2⤵
        PID:1692
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn amsi /tr "C:\Users\Admin\slui\comp.exe" /sc minute /mo 1 /F
        2⤵
        • Creates scheduled task(s)
        PID:656
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {58593157-B391-4400-AB66-25E3FF965CDB} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\slui\comp.exe
        C:\Users\Admin\slui\comp.exe
        2⤵
        • Executes dropped EXE
        PID:1944
      • C:\Users\Admin\slui\comp.exe
        C:\Users\Admin\slui\comp.exe
        2⤵
          PID:1380

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Discovery

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      2
      T1120

      System Information Discovery

      3
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\h21vnc.exe
        MD5

        2aa5b4a93c2ccd200e4d97a64b84aefb

        SHA1

        85934cf71fa56f27789686b7ed6db9b82f6417c1

        SHA256

        bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

        SHA512

        f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

      • C:\Users\Admin\slui\comp.exe
        MD5

        ffb54a57f51ab674f873df2bd3f98846

        SHA1

        844fb6a8a2308a29c28fb8792109e56cb42d7125

        SHA256

        468e0e6d7cca94e79b4d858dd4795bff734bdf094f4ab1fb185850abdeeeb338

        SHA512

        64170d09b20f54c835352fdb0f52c4a28d8bfda20079ea14ca179d8e9b012146c99c38c2282d620aeeb4a2cbc7b091b44910d5be70cc2f3da94fb6de8ca53388

      • C:\Users\Admin\slui\comp.exe
        MD5

        ffb54a57f51ab674f873df2bd3f98846

        SHA1

        844fb6a8a2308a29c28fb8792109e56cb42d7125

        SHA256

        468e0e6d7cca94e79b4d858dd4795bff734bdf094f4ab1fb185850abdeeeb338

        SHA512

        64170d09b20f54c835352fdb0f52c4a28d8bfda20079ea14ca179d8e9b012146c99c38c2282d620aeeb4a2cbc7b091b44910d5be70cc2f3da94fb6de8ca53388

      • C:\Users\Admin\slui\comp.exe
        MD5

        ffb54a57f51ab674f873df2bd3f98846

        SHA1

        844fb6a8a2308a29c28fb8792109e56cb42d7125

        SHA256

        468e0e6d7cca94e79b4d858dd4795bff734bdf094f4ab1fb185850abdeeeb338

        SHA512

        64170d09b20f54c835352fdb0f52c4a28d8bfda20079ea14ca179d8e9b012146c99c38c2282d620aeeb4a2cbc7b091b44910d5be70cc2f3da94fb6de8ca53388

      • \Users\Admin\AppData\Local\Temp\h21vnc.exe
        MD5

        2aa5b4a93c2ccd200e4d97a64b84aefb

        SHA1

        85934cf71fa56f27789686b7ed6db9b82f6417c1

        SHA256

        bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

        SHA512

        f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

      • \Users\Admin\AppData\Local\Temp\h21vnc.exe
        MD5

        2aa5b4a93c2ccd200e4d97a64b84aefb

        SHA1

        85934cf71fa56f27789686b7ed6db9b82f6417c1

        SHA256

        bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

        SHA512

        f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

      • \Users\Admin\AppData\Local\Temp\h21vnc.exe
        MD5

        2aa5b4a93c2ccd200e4d97a64b84aefb

        SHA1

        85934cf71fa56f27789686b7ed6db9b82f6417c1

        SHA256

        bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

        SHA512

        f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

      • \Users\Admin\AppData\Local\Temp\h21vnc.exe
        MD5

        2aa5b4a93c2ccd200e4d97a64b84aefb

        SHA1

        85934cf71fa56f27789686b7ed6db9b82f6417c1

        SHA256

        bed35f8f672d014833f77e430dc6cef5669d7f4997c6353a57a328af9ee37a26

        SHA512

        f79a3e2e1dd2185325037cabdd9ed6581ae09a4961b9170563b5975dd98b17bcd041e9c0c3e460eef2ac806d3e57b72e50e8055b96c513be1c9568423d650756

      • memory/656-77-0x0000000000000000-mapping.dmp
      • memory/1096-59-0x00000000768B1000-0x00000000768B3000-memory.dmp
        Filesize

        8KB

      • memory/1096-74-0x0000000000B70000-0x0000000000B71000-memory.dmp
        Filesize

        4KB

      • memory/1220-64-0x0000000000000000-mapping.dmp
      • memory/1380-82-0x0000000000000000-mapping.dmp
      • memory/1412-75-0x0000000000020000-0x0000000000021000-memory.dmp
        Filesize

        4KB

      • memory/1412-76-0x00000000002F0000-0x000000000038C000-memory.dmp
        Filesize

        624KB

      • memory/1412-67-0x0000000000000000-mapping.dmp
      • memory/1692-72-0x000000000009A1F8-mapping.dmp
      • memory/1692-68-0x0000000000080000-0x00000000000A0000-memory.dmp
        Filesize

        128KB

      • memory/1944-79-0x0000000000000000-mapping.dmp