Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 22:37
Behavioral task
behavioral1
Sample
9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe
Resource
win10v2004-20220721-en
General
-
Target
9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe
-
Size
1.8MB
-
MD5
e2aaaa8dca87da4b8e76441cdda8a344
-
SHA1
a7815af1153100a5785506b0b3fb90289d47a0dd
-
SHA256
9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a
-
SHA512
bc5d4b4420200d68d08f90b146675d19fda0ba789df81035f2190c61b9227df87e9e4a24b6f6f8c12485daaf63ccb83167c6c60455a1959212711641a20cedb6
Malware Config
Extracted
azorult
http://julaly.ml/tiv202/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
suricata: ET MALWARE AZORult Variant.4 Checkin M2
suricata: ET MALWARE AZORult Variant.4 Checkin M2
-
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6
-
Executes dropped EXE 2 IoCs
Processes:
Bonesr.exeBonesr.exepid process 988 Bonesr.exe 1148 Bonesr.exe -
Processes:
resource yara_rule behavioral1/memory/2000-59-0x0000000000400000-0x0000000000483000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exeBonesr.exepid process 2000 9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe 2000 9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe 988 Bonesr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Bonesr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\NNFNMU = "C:\\Users\\Admin\\AppData\\Local\\NNFNMU\\NNFNMUYUI.vbs" Bonesr.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bonesr.exedescription pid process target process PID 988 set thread context of 1148 988 Bonesr.exe Bonesr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exeBonesr.exedescription pid process target process PID 2000 wrote to memory of 988 2000 9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe Bonesr.exe PID 2000 wrote to memory of 988 2000 9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe Bonesr.exe PID 2000 wrote to memory of 988 2000 9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe Bonesr.exe PID 2000 wrote to memory of 988 2000 9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe PID 988 wrote to memory of 1148 988 Bonesr.exe Bonesr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe"C:\Users\Admin\AppData\Local\Temp\9320f896b3bccdd93eafdfef6bfcb75c57a228fa50f3978c44e8e07ac693698a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Bonesr.exeC:\Users\Admin\AppData\Local\Temp\Bonesr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\Bonesr.exe"C:\Users\Admin\AppData\Local\Temp\Bonesr.exe"3⤵
- Executes dropped EXE
PID:1148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d9b5142d73d47a0202347096778f3595
SHA1718ed8b94bc04374e16d7ead1e6ea01ce40be332
SHA2565a3a0ef21119810d6eb0a7510e8e78b4cc9bef75d0981a42f1eaa982b2264326
SHA5128b96992d2aee5eae8d3c1fd89a4d7aef663dcb73a39d523a0699653b561ab0c9e02a27f6b3f4993d037bff2b3863fdb44f1253d01dcfdbaa5590dc8df9f0f9ca
-
Filesize
560KB
MD5134a89a84d775ec24c5bf53ce3cbe0ed
SHA1b5228bcef474f53ac4e55cb3869d87fb3abee6f3
SHA256f05ba52e38c6c13f36bf903b2f045f29c3f826d1c3ecf2e86bb1458494edb3e0
SHA512f0911b9f73ae0738e07eac55f51034efc5230e943f8dd00b3a254df1bcae72d070b4924d1ebbc130a81ceecb520662b04a41c0a3ac1c95792415008a3c3aa920
-
Filesize
560KB
MD5134a89a84d775ec24c5bf53ce3cbe0ed
SHA1b5228bcef474f53ac4e55cb3869d87fb3abee6f3
SHA256f05ba52e38c6c13f36bf903b2f045f29c3f826d1c3ecf2e86bb1458494edb3e0
SHA512f0911b9f73ae0738e07eac55f51034efc5230e943f8dd00b3a254df1bcae72d070b4924d1ebbc130a81ceecb520662b04a41c0a3ac1c95792415008a3c3aa920
-
Filesize
560KB
MD5134a89a84d775ec24c5bf53ce3cbe0ed
SHA1b5228bcef474f53ac4e55cb3869d87fb3abee6f3
SHA256f05ba52e38c6c13f36bf903b2f045f29c3f826d1c3ecf2e86bb1458494edb3e0
SHA512f0911b9f73ae0738e07eac55f51034efc5230e943f8dd00b3a254df1bcae72d070b4924d1ebbc130a81ceecb520662b04a41c0a3ac1c95792415008a3c3aa920
-
Filesize
560KB
MD5134a89a84d775ec24c5bf53ce3cbe0ed
SHA1b5228bcef474f53ac4e55cb3869d87fb3abee6f3
SHA256f05ba52e38c6c13f36bf903b2f045f29c3f826d1c3ecf2e86bb1458494edb3e0
SHA512f0911b9f73ae0738e07eac55f51034efc5230e943f8dd00b3a254df1bcae72d070b4924d1ebbc130a81ceecb520662b04a41c0a3ac1c95792415008a3c3aa920
-
Filesize
560KB
MD5134a89a84d775ec24c5bf53ce3cbe0ed
SHA1b5228bcef474f53ac4e55cb3869d87fb3abee6f3
SHA256f05ba52e38c6c13f36bf903b2f045f29c3f826d1c3ecf2e86bb1458494edb3e0
SHA512f0911b9f73ae0738e07eac55f51034efc5230e943f8dd00b3a254df1bcae72d070b4924d1ebbc130a81ceecb520662b04a41c0a3ac1c95792415008a3c3aa920
-
Filesize
560KB
MD5134a89a84d775ec24c5bf53ce3cbe0ed
SHA1b5228bcef474f53ac4e55cb3869d87fb3abee6f3
SHA256f05ba52e38c6c13f36bf903b2f045f29c3f826d1c3ecf2e86bb1458494edb3e0
SHA512f0911b9f73ae0738e07eac55f51034efc5230e943f8dd00b3a254df1bcae72d070b4924d1ebbc130a81ceecb520662b04a41c0a3ac1c95792415008a3c3aa920