Analysis
-
max time kernel
144s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:38
Static task
static1
Behavioral task
behavioral1
Sample
TNT SHIPPING DOCUMENT.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
TNT SHIPPING DOCUMENT.exe
Resource
win10v2004-20220414-en
General
-
Target
TNT SHIPPING DOCUMENT.exe
-
Size
267KB
-
MD5
4d921621521f649ea4741d7687f4fa34
-
SHA1
01118b049ea747d80ed65742f95c88f16fe92cdb
-
SHA256
94d39d6f9db604c0b356bb0115d361c9243bc67cb9a657e5310debed783cb6d3
-
SHA512
6ee927ef7f43aac9e75a9c3e43cd4cd9b51de1973709fb21a7c4e027e77622cd5b5e143b7670535e7a7a580800a5d8b9549d8e106a1f508290c53f3d58708e3f
Malware Config
Extracted
azorult
http://waterchem.com.tr/css/Panel/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
TNT SHIPPING DOCUMENT.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TNT SHIPPING DOCUMENT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TNT SHIPPING DOCUMENT.exe -
Uses the VBS compiler for execution 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
TNT SHIPPING DOCUMENT.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum TNT SHIPPING DOCUMENT.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 TNT SHIPPING DOCUMENT.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TNT SHIPPING DOCUMENT.exedescription pid process target process PID 2520 set thread context of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
TNT SHIPPING DOCUMENT.exedescription pid process target process PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe PID 2520 wrote to memory of 2792 2520 TNT SHIPPING DOCUMENT.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TNT SHIPPING DOCUMENT.exe"C:\Users\Admin\AppData\Local\Temp\TNT SHIPPING DOCUMENT.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"{path}"2⤵PID:2792