Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 06:47
Static task
static1
Behavioral task
behavioral1
Sample
e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe
Resource
win10v2004-20220721-en
General
-
Target
e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe
-
Size
764KB
-
MD5
98a3c6b6fbcb74e61ae91b97c1a51a00
-
SHA1
cc477b76ab7beb0e4014122b45626dc67ff2a077
-
SHA256
e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7
-
SHA512
2dc4501cb0a0f5bee4e1e5b67e00e4204ad6db09128b78dba28c78ffe6a49f50daa4b7120c1cf96141f01d81390fdfa58d738ea54f2fe4a257a589f1ff66f5eb
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
2CVXGH~1.EXE2CVXGH~1.EXEpid process 3524 2CVXGH~1.EXE 4256 2CVXGH~1.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
2CVXGH~1.EXE2CVXGH~1.EXEpid process 3524 2CVXGH~1.EXE 4256 2CVXGH~1.EXE 4256 2CVXGH~1.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2CVXGH~1.EXEdescription pid process target process PID 3524 set thread context of 4256 3524 2CVXGH~1.EXE 2CVXGH~1.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
2CVXGH~1.EXEpid process 3524 2CVXGH~1.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe2CVXGH~1.EXEdescription pid process target process PID 4572 wrote to memory of 3524 4572 e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe 2CVXGH~1.EXE PID 4572 wrote to memory of 3524 4572 e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe 2CVXGH~1.EXE PID 4572 wrote to memory of 3524 4572 e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe 2CVXGH~1.EXE PID 3524 wrote to memory of 4256 3524 2CVXGH~1.EXE 2CVXGH~1.EXE PID 3524 wrote to memory of 4256 3524 2CVXGH~1.EXE 2CVXGH~1.EXE PID 3524 wrote to memory of 4256 3524 2CVXGH~1.EXE 2CVXGH~1.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe"C:\Users\Admin\AppData\Local\Temp\e5c4c30e0ba56d80385009ce8d1fdbca75a9d9641d4b58cd7c4b75ec5a6295d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2CVXGH~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2CVXGH~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2CVXGH~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2CVXGH~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD5f5ece5a5ef7d90c814b57ebd25ba623d
SHA180549a8e114ef424f926cf474f59b68b93caff8d
SHA256b1b796fc1e8bbe1ac66b1b97dea0cc39e33490e33aef68bde0a332682718552a
SHA5122c9db77a0006b1520ebb1d2419575b42f73dfa178a8d7eaa87adf97369faee9ffc1aa60d7223afa103776c5ea785d29d0da446fc70d295db07f54904001351be
-
Filesize
8.5MB
MD5b4c01378771f8e2f3545ac211dcef10d
SHA1c83fda4f4f5c9fec20b7e760ff7a2cf94abb3242
SHA256e8f4a4bd19c254bd393b20e4b59bbfd12725031e574de25b71899ba37f212535
SHA512614697a4a34a5424ecf418e593f28c40b58230177fbea88244f865d83bef17f7990fb7fb21ca5394a6a900ae4eeb863aa85e3b4d88debe8acb91b2edccef6ea3
-
Filesize
1.3MB
MD535e57568e6c69670342246181514dac2
SHA1c3d583f12c63da6e1d44e3b16597bf48dc81c4c8
SHA256aaa953c90c35131b605cc2378607803e8a18ff621dc34bce4e8fcda6a82e6d43
SHA512c5d5d038cb142d9519e11ccb1b8eeb5e2657b39a9a03b561ffa9c28481b57942dd9b662861a7918a2e084e1bb78b2f4488debf7c7dbcadea5489cafd96724229