Analysis

  • max time kernel
    91s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 01:46

General

  • Target

    4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c.exe

  • Size

    501KB

  • MD5

    7860c138e3b8f40bfb6efec08f4a4068

  • SHA1

    28718036a0ff9ecd92e794cefc429f3d4aea7ba1

  • SHA256

    4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c

  • SHA512

    71686bdfa1d10e50ee82374dfde16c45b3bc338065f24e3f5f68ddf984ba6a97624e88f147183c9f3874d14725d75e236d0c209d3eb5d924e9dff3ac1815f620

Malware Config

Extracted

Family

azorult

C2

http://crevisoft.net/images/backgrounds/ob/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

    suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c.exe
    "C:\Users\Admin\AppData\Local\Temp\4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YJSlNpkH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBE10.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2504
    • C:\Users\Admin\AppData\Local\Temp\4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c.exe
      "C:\Users\Admin\AppData\Local\Temp\4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c.exe"
      2⤵
      • Modifies system certificate store
      PID:3748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpBE10.tmp

    Filesize

    1KB

    MD5

    67a24f5fd084776aa0b58544d7a93aa0

    SHA1

    fd7fa08cc6a7e3a0c34c78e88b2432d750c9c9fa

    SHA256

    74c3985de8769ace8cec820495a35d3b17d5650cd993e23a97042762bcce617f

    SHA512

    964d9c9c62188223cc151ce871321410c0aa15ef2f098646f43d350959ba33c880f3ca4e6726295f0da9f0c14c18f37d71add7891f7f95ba5ae48f73ebc1045f

  • memory/2504-135-0x0000000000000000-mapping.dmp

  • memory/3748-137-0x0000000000000000-mapping.dmp

  • memory/3748-138-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3748-140-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3748-141-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4892-130-0x0000000000780000-0x0000000000804000-memory.dmp

    Filesize

    528KB

  • memory/4892-131-0x0000000007640000-0x00000000076D2000-memory.dmp

    Filesize

    584KB

  • memory/4892-132-0x0000000007D00000-0x0000000007D9C000-memory.dmp

    Filesize

    624KB

  • memory/4892-133-0x0000000008350000-0x00000000088F4000-memory.dmp

    Filesize

    5.6MB

  • memory/4892-134-0x0000000007E80000-0x0000000007EE6000-memory.dmp

    Filesize

    408KB