Analysis
-
max time kernel
100s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 07:02
Static task
static1
Behavioral task
behavioral1
Sample
60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe
Resource
win10v2004-20220721-en
General
-
Target
60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe
-
Size
3.3MB
-
MD5
fb46fcac2d17b14c30e8d68a0f0a0023
-
SHA1
2e1d44ac241843f02b7b190902928e1acce27d4c
-
SHA256
60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b
-
SHA512
e6e7ed6be686a0ef9a6d1e6f930a88260fd8c27cf06aea51934efc027bec75d2066b7ab8b95b9ed8f7a6cf0bd98cbe7a3a15e87c9cf464ac404b3d04196f9dfb
Malware Config
Extracted
azorult
http://licilucapiluca.rocks/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
busshost.exeYTLoader.exepid process 1288 busshost.exe 1200 YTLoader.exe -
Loads dropped DLL 8 IoCs
Processes:
60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exeWerFault.exepid process 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe 1724 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
Processes:
60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exedescription ioc process File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe File created C:\Program Files (x86)\LetsSee!\Uninstall.ini 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1724 1200 WerFault.exe YTLoader.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
YTLoader.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString YTLoader.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 YTLoader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
YTLoader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS YTLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer YTLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName YTLoader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
YTLoader.exedescription pid process Token: SeDebugPrivilege 1200 YTLoader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exeYTLoader.exedescription pid process target process PID 1372 wrote to memory of 1288 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe busshost.exe PID 1372 wrote to memory of 1288 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe busshost.exe PID 1372 wrote to memory of 1288 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe busshost.exe PID 1372 wrote to memory of 1288 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe busshost.exe PID 1372 wrote to memory of 1200 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe YTLoader.exe PID 1372 wrote to memory of 1200 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe YTLoader.exe PID 1372 wrote to memory of 1200 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe YTLoader.exe PID 1372 wrote to memory of 1200 1372 60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe YTLoader.exe PID 1200 wrote to memory of 1724 1200 YTLoader.exe WerFault.exe PID 1200 wrote to memory of 1724 1200 YTLoader.exe WerFault.exe PID 1200 wrote to memory of 1724 1200 YTLoader.exe WerFault.exe PID 1200 wrote to memory of 1724 1200 YTLoader.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe"C:\Users\Admin\AppData\Local\Temp\60187f056167cf2f951a8a9302e312ff9e83cafbf6ae7d436e3db1646b8b092b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\LetsSee!\busshost.exe"C:\Program Files (x86)\LetsSee!\busshost.exe"2⤵
- Executes dropped EXE
PID:1288
-
-
C:\Program Files (x86)\LetsSee!\YTLoader.exe"C:\Program Files (x86)\LetsSee!\YTLoader.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 11723⤵
- Loads dropped DLL
- Program crash
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
406KB
MD5d6422d74934d39845e107a25e16a2146
SHA187b7bb22fd16e36ed34476b8660af1f8b831a76b
SHA2569b664cd4a3de25b2b3955b5984cd5f191cb364e0b25c53e01712f4c59fa48bf4
SHA512baa642e5143f8bea715a35da98e0421ea0efcb5175407965f135fb7af134788528af3e6ecff02231901bf40f7e52e4b6174f529a823200d560598349f894e5f1
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
Filesize
406KB
MD5d6422d74934d39845e107a25e16a2146
SHA187b7bb22fd16e36ed34476b8660af1f8b831a76b
SHA2569b664cd4a3de25b2b3955b5984cd5f191cb364e0b25c53e01712f4c59fa48bf4
SHA512baa642e5143f8bea715a35da98e0421ea0efcb5175407965f135fb7af134788528af3e6ecff02231901bf40f7e52e4b6174f529a823200d560598349f894e5f1
-
Filesize
406KB
MD5d6422d74934d39845e107a25e16a2146
SHA187b7bb22fd16e36ed34476b8660af1f8b831a76b
SHA2569b664cd4a3de25b2b3955b5984cd5f191cb364e0b25c53e01712f4c59fa48bf4
SHA512baa642e5143f8bea715a35da98e0421ea0efcb5175407965f135fb7af134788528af3e6ecff02231901bf40f7e52e4b6174f529a823200d560598349f894e5f1