Analysis Overview
SHA256
56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3
Threat Level: Known bad
The file 56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe was found to be: Known bad.
Malicious Activity Summary
Azorult
Checks computer location settings
Adds Run key to start application
Suspicious use of SetThreadContext
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Delays execution with timeout.exe
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-05-23 01:49
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-05-23 01:49
Reported
2022-05-23 01:57
Platform
win7-20220414-en
Max time kernel
43s
Max time network
48s
Command Line
Signatures
Azorult
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox = "\"C:\\Users\\Admin\\AppData\\Local\\firefox.exe\"" | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 276 set thread context of 912 | N/A | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
"C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout 20
C:\Windows\SysWOW64\timeout.exe
timeout 20
C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bl1we4t.xyz | udp |
| US | 8.8.8.8:53 | bl1we4t.xyz | udp |
Files
memory/276-54-0x0000000001310000-0x0000000001484000-memory.dmp
memory/276-55-0x00000000053C0000-0x000000000552E000-memory.dmp
memory/276-56-0x0000000075721000-0x0000000075723000-memory.dmp
memory/1780-57-0x0000000000000000-mapping.dmp
memory/1488-58-0x0000000000000000-mapping.dmp
memory/276-59-0x0000000000CA0000-0x0000000000CDA000-memory.dmp
memory/912-60-0x0000000000400000-0x0000000000420000-memory.dmp
memory/912-61-0x0000000000400000-0x0000000000420000-memory.dmp
memory/912-63-0x0000000000400000-0x0000000000420000-memory.dmp
memory/912-64-0x0000000000400000-0x0000000000420000-memory.dmp
memory/912-65-0x0000000000400000-0x0000000000420000-memory.dmp
memory/912-67-0x0000000000400000-0x0000000000420000-memory.dmp
memory/912-68-0x000000000041A684-mapping.dmp
memory/912-70-0x0000000000400000-0x0000000000420000-memory.dmp
memory/912-72-0x0000000000400000-0x0000000000420000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-05-23 01:49
Reported
2022-05-23 01:57
Platform
win10v2004-20220414-en
Max time kernel
136s
Max time network
156s
Command Line
Signatures
Azorult
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefox = "\"C:\\Users\\Admin\\AppData\\Local\\firefox.exe\"" | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3824 set thread context of 444 | N/A | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
"C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout 20
C:\Windows\SysWOW64\timeout.exe
timeout 20
C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bl1we4t.xyz | udp |
| US | 209.197.3.8:80 | tcp | |
| US | 8.8.8.8:53 | bl1we4t.xyz | udp |
| IE | 13.69.239.73:443 | tcp | |
| US | 8.8.8.8:53 | 176.122.125.40.in-addr.arpa | udp |
| US | 67.26.211.254:80 | tcp | |
| US | 67.26.211.254:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| US | 204.79.197.203:80 | tcp |
Files
memory/3824-130-0x0000000000180000-0x00000000002F4000-memory.dmp
memory/3824-131-0x00000000059E0000-0x0000000005FF8000-memory.dmp
memory/3824-132-0x00000000065B0000-0x0000000006B54000-memory.dmp
memory/3824-133-0x0000000005560000-0x00000000055F2000-memory.dmp
memory/5108-134-0x0000000000000000-mapping.dmp
memory/1960-135-0x0000000000000000-mapping.dmp
memory/444-136-0x0000000000000000-mapping.dmp
memory/444-137-0x0000000000400000-0x0000000000420000-memory.dmp
memory/444-139-0x0000000000400000-0x0000000000420000-memory.dmp
memory/444-140-0x0000000000400000-0x0000000000420000-memory.dmp