Analysis
-
max time kernel
60s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-06-2021 18:02
Static task
static1
Behavioral task
behavioral1
Sample
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe
Resource
win7v20210410
General
-
Target
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe
-
Size
319KB
-
MD5
cf3e02420036747df018012ab33dec0a
-
SHA1
ce9db535821d7d43efeaf7e23df75977cb36d908
-
SHA256
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea
-
SHA512
a36c0ecc4184f0f815e55bfc3c67bd1a1b3cc6473e51e0e4af881278e05597273973aeeda5df0af502f5a502000cf858583bd694cfcbfee850df0b9c607e7fbd
Malware Config
Extracted
azorult
http://80.85.136.155/mia/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
pid Process 3952 ExcelViewer.exe 3684 ExcelViewer.exe -
resource yara_rule behavioral2/memory/3684-134-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2192 set thread context of 3304 2192 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 79 PID 3952 set thread context of 3684 3952 ExcelViewer.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2192 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 3952 ExcelViewer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3684 ExcelViewer.exe Token: SeCreatePagefilePrivilege 3684 ExcelViewer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2192 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 3952 ExcelViewer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3304 2192 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 79 PID 2192 wrote to memory of 3304 2192 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 79 PID 2192 wrote to memory of 3304 2192 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 79 PID 2192 wrote to memory of 3304 2192 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 79 PID 3304 wrote to memory of 3952 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 80 PID 3304 wrote to memory of 3952 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 80 PID 3304 wrote to memory of 3952 3304 b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe 80 PID 3952 wrote to memory of 3684 3952 ExcelViewer.exe 81 PID 3952 wrote to memory of 3684 3952 ExcelViewer.exe 81 PID 3952 wrote to memory of 3684 3952 ExcelViewer.exe 81 PID 3952 wrote to memory of 3684 3952 ExcelViewer.exe 81 PID 3684 wrote to memory of 2764 3684 ExcelViewer.exe 83 PID 3684 wrote to memory of 2764 3684 ExcelViewer.exe 83 PID 3684 wrote to memory of 2764 3684 ExcelViewer.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe"C:\Users\Admin\AppData\Local\Temp\b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe"C:\Users\Admin\AppData\Local\Temp\b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\ExcelViewer.exe"C:\Users\Admin\AppData\Local\Temp\ExcelViewer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\ExcelViewer.exe"C:\Users\Admin\AppData\Local\Temp\ExcelViewer.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NfydCUbfiRWtQ1qa.bat" "5⤵PID:2764
-
-
-
-