Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 18:13
Static task
static1
Behavioral task
behavioral1
Sample
5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe
Resource
win10v2004-20220414-en
General
-
Target
5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe
-
Size
1.4MB
-
MD5
6ae1da8abe6ef9817a617acec71bab22
-
SHA1
aa61bd2997030f1798399708fc07eca23887d0fc
-
SHA256
5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54
-
SHA512
fe6c6328d990f67b28ae7478d025fcb1e5a6c5f2a974dece4b5ab70a7b7106f720118ed2257cf39419221b29c4b53e34099402bca73846a18050d64f03a2e355
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
levitt.ug
Extracted
raccoon
180d3985eb74eacf2de83c771fbf30a60f670ec0
-
url4cnc
https://telete.in/jrikitiki
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/1284-86-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon -
Executes dropped EXE 4 IoCs
pid Process 1580 HjsdfvUJq.exe 1252 PVBsjqrhd.exe 2036 PVBsjqrhd.exe 1192 HjsdfvUJq.exe -
Loads dropped DLL 11 IoCs
pid Process 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 1580 HjsdfvUJq.exe 1252 PVBsjqrhd.exe 1488 WerFault.exe 1488 WerFault.exe 1488 WerFault.exe 1488 WerFault.exe 1488 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 860 set thread context of 1284 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 29 PID 1252 set thread context of 2036 1252 PVBsjqrhd.exe 31 PID 1580 set thread context of 1192 1580 HjsdfvUJq.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1488 2036 WerFault.exe 31 -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 1252 PVBsjqrhd.exe 1580 HjsdfvUJq.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 1580 HjsdfvUJq.exe 1252 PVBsjqrhd.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 860 wrote to memory of 1580 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 27 PID 860 wrote to memory of 1580 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 27 PID 860 wrote to memory of 1580 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 27 PID 860 wrote to memory of 1580 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 27 PID 860 wrote to memory of 1252 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 28 PID 860 wrote to memory of 1252 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 28 PID 860 wrote to memory of 1252 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 28 PID 860 wrote to memory of 1252 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 28 PID 860 wrote to memory of 1284 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 29 PID 860 wrote to memory of 1284 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 29 PID 860 wrote to memory of 1284 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 29 PID 860 wrote to memory of 1284 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 29 PID 860 wrote to memory of 1284 860 5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe 29 PID 1252 wrote to memory of 2036 1252 PVBsjqrhd.exe 31 PID 1252 wrote to memory of 2036 1252 PVBsjqrhd.exe 31 PID 1252 wrote to memory of 2036 1252 PVBsjqrhd.exe 31 PID 1252 wrote to memory of 2036 1252 PVBsjqrhd.exe 31 PID 1580 wrote to memory of 1192 1580 HjsdfvUJq.exe 30 PID 1580 wrote to memory of 1192 1580 HjsdfvUJq.exe 30 PID 1580 wrote to memory of 1192 1580 HjsdfvUJq.exe 30 PID 1252 wrote to memory of 2036 1252 PVBsjqrhd.exe 31 PID 1580 wrote to memory of 1192 1580 HjsdfvUJq.exe 30 PID 1580 wrote to memory of 1192 1580 HjsdfvUJq.exe 30 PID 2036 wrote to memory of 1488 2036 PVBsjqrhd.exe 36 PID 2036 wrote to memory of 1488 2036 PVBsjqrhd.exe 36 PID 2036 wrote to memory of 1488 2036 PVBsjqrhd.exe 36 PID 2036 wrote to memory of 1488 2036 PVBsjqrhd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe"C:\Users\Admin\AppData\Local\Temp\5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\HjsdfvUJq.exe"C:\Users\Admin\AppData\Local\Temp\HjsdfvUJq.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\HjsdfvUJq.exe"C:\Users\Admin\AppData\Local\Temp\HjsdfvUJq.exe"3⤵
- Executes dropped EXE
PID:1192
-
-
-
C:\Users\Admin\AppData\Local\Temp\PVBsjqrhd.exe"C:\Users\Admin\AppData\Local\Temp\PVBsjqrhd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\PVBsjqrhd.exe"C:\Users\Admin\AppData\Local\Temp\PVBsjqrhd.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 6324⤵
- Loads dropped DLL
- Program crash
PID:1488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe"C:\Users\Admin\AppData\Local\Temp\5cd5861ce0c007ee7d09a79df1a93424ee1f4c2ed503b140e60ac22f6e5ece54.exe"2⤵PID:1284
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
436KB
MD5c23be449bcf691fd13acb7cb189810b6
SHA123061d43f2f88bd2dd4156c9a5565886ab849254
SHA256149666943b87827efdf3cd86953e1a4734543df408afc937ac31f96b6ebf9788
SHA5128938ad5fae55a929edc5a1f502aa1b6a7b936058d392950a32a39885cd48f30b39adf755fd20b9df7035a9cddf5c0f1a1140cb1d19b3a15f2d19eebc7111a82e
-
Filesize
436KB
MD5c23be449bcf691fd13acb7cb189810b6
SHA123061d43f2f88bd2dd4156c9a5565886ab849254
SHA256149666943b87827efdf3cd86953e1a4734543df408afc937ac31f96b6ebf9788
SHA5128938ad5fae55a929edc5a1f502aa1b6a7b936058d392950a32a39885cd48f30b39adf755fd20b9df7035a9cddf5c0f1a1140cb1d19b3a15f2d19eebc7111a82e
-
Filesize
436KB
MD5c23be449bcf691fd13acb7cb189810b6
SHA123061d43f2f88bd2dd4156c9a5565886ab849254
SHA256149666943b87827efdf3cd86953e1a4734543df408afc937ac31f96b6ebf9788
SHA5128938ad5fae55a929edc5a1f502aa1b6a7b936058d392950a32a39885cd48f30b39adf755fd20b9df7035a9cddf5c0f1a1140cb1d19b3a15f2d19eebc7111a82e
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
436KB
MD5c23be449bcf691fd13acb7cb189810b6
SHA123061d43f2f88bd2dd4156c9a5565886ab849254
SHA256149666943b87827efdf3cd86953e1a4734543df408afc937ac31f96b6ebf9788
SHA5128938ad5fae55a929edc5a1f502aa1b6a7b936058d392950a32a39885cd48f30b39adf755fd20b9df7035a9cddf5c0f1a1140cb1d19b3a15f2d19eebc7111a82e
-
Filesize
436KB
MD5c23be449bcf691fd13acb7cb189810b6
SHA123061d43f2f88bd2dd4156c9a5565886ab849254
SHA256149666943b87827efdf3cd86953e1a4734543df408afc937ac31f96b6ebf9788
SHA5128938ad5fae55a929edc5a1f502aa1b6a7b936058d392950a32a39885cd48f30b39adf755fd20b9df7035a9cddf5c0f1a1140cb1d19b3a15f2d19eebc7111a82e
-
Filesize
436KB
MD5c23be449bcf691fd13acb7cb189810b6
SHA123061d43f2f88bd2dd4156c9a5565886ab849254
SHA256149666943b87827efdf3cd86953e1a4734543df408afc937ac31f96b6ebf9788
SHA5128938ad5fae55a929edc5a1f502aa1b6a7b936058d392950a32a39885cd48f30b39adf755fd20b9df7035a9cddf5c0f1a1140cb1d19b3a15f2d19eebc7111a82e
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071
-
Filesize
480KB
MD5b1826c325261eb4f435f3f1148576a23
SHA12d475fc66a06d299782f72fd82b0823c23bc72b1
SHA2561e433ad9b3a8bb067865903abd9ccac597ad73352c2f18d6d55fbf83ba0a8da2
SHA5120e95f2a6f61ea6b7388453643e005a832ddaa2bb77a12b3787f122008720b917be551acab8cd504908ae7615e9adb95e599c500163b20be82db6b06a07717071