Analysis

  • max time kernel
    170s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 14:47

General

  • Target

    ATTACHEM.exe

  • Size

    529KB

  • MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

  • SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

  • SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

  • SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

Malware Config

Extracted

Family

azorult

C2

http://lawantumorotak.com/img/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NTFS ADS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ATTACHEM.exe
    "C:\Users\Admin\AppData\Local\Temp\ATTACHEM.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\ATTACHEM.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1080
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\ATTACHEM.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1788
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ATTACHEM.exe" "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe"
      2⤵
      • NTFS ADS
      PID:1616
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
        "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:904
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:1392
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:1652
        • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
          "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe"
          4⤵
          • Executes dropped EXE
          PID:1732
        • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
          "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe"
          4⤵
          • Executes dropped EXE
          PID:1380
        • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
          "C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe"
          4⤵
          • Executes dropped EXE
          PID:1508

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
    Filesize

    529KB

    MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

    SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

    SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

    SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

  • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
    Filesize

    529KB

    MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

    SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

    SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

    SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

  • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
    Filesize

    529KB

    MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

    SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

    SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

    SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

  • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
    Filesize

    529KB

    MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

    SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

    SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

    SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

  • C:\Users\Admin\AppData\Roaming\asfasddsfasf.exe
    Filesize

    529KB

    MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

    SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

    SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

    SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

  • \Users\Admin\AppData\Roaming\asfasddsfasf.exe
    Filesize

    529KB

    MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

    SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

    SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

    SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

  • \Users\Admin\AppData\Roaming\asfasddsfasf.exe
    Filesize

    529KB

    MD5

    84a9e3f3782f6c6e8a8d53ea4822bce7

    SHA1

    fdf97e6f3455ebd935e56da73c7a181f4ffe0212

    SHA256

    38a689e3cfe024cf53d07e3f6830da32c836c4c06c96478fda9a36e22d540a9c

    SHA512

    288e884e274ad365d75334e59a8e97839f608525f7af7854c69c5e0c6665157aec3b4b4034e6c4f7e8338191a72f0df1865f3d248aea14ff2f6474c97d0fef42

  • memory/904-72-0x0000000004760000-0x000000000476C000-memory.dmp
    Filesize

    48KB

  • memory/904-66-0x0000000000000000-mapping.dmp
  • memory/904-68-0x0000000000280000-0x0000000000308000-memory.dmp
    Filesize

    544KB

  • memory/1080-57-0x0000000000000000-mapping.dmp
  • memory/1240-63-0x0000000000000000-mapping.dmp
  • memory/1392-70-0x0000000000000000-mapping.dmp
  • memory/1508-76-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1508-83-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1508-89-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1508-87-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1508-84-0x000000000041A1F8-mapping.dmp
  • memory/1508-81-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1508-80-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1508-79-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1508-77-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/1616-62-0x0000000000000000-mapping.dmp
  • memory/1652-71-0x0000000000000000-mapping.dmp
  • memory/1788-59-0x0000000000000000-mapping.dmp
  • memory/1836-54-0x0000000000170000-0x00000000001F8000-memory.dmp
    Filesize

    544KB

  • memory/1836-56-0x0000000075F61000-0x0000000075F63000-memory.dmp
    Filesize

    8KB

  • memory/1836-58-0x00000000007B0000-0x00000000007BA000-memory.dmp
    Filesize

    40KB

  • memory/1836-60-0x00000000007C0000-0x00000000007CC000-memory.dmp
    Filesize

    48KB

  • memory/1836-55-0x0000000000240000-0x000000000026A000-memory.dmp
    Filesize

    168KB

  • memory/1836-61-0x00000000007F0000-0x00000000007F6000-memory.dmp
    Filesize

    24KB