Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 20:43
Static task
static1
Behavioral task
behavioral1
Sample
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe
Resource
win10v2004-20220721-en
General
-
Target
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe
-
Size
1.7MB
-
MD5
746f7df0c1d2ff1c7c4fe90e3a24ae48
-
SHA1
934a527ae8b8cdeaaf49b90193a9fcc1ae925854
-
SHA256
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
-
SHA512
533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
Malware Config
Extracted
azorult
http://104.233.105.159/0/van/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
WORD.exeWORD.exepid process 1908 WORD.exe 1100 WORD.exe -
Loads dropped DLL 3 IoCs
Processes:
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exeWORD.exepid process 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe 1908 WORD.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\WORD = "C:\\Users\\Admin\\AppData\\Local\\Temp\\OFFICE\\WORD.vbs -VA" WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
WORD.exedescription pid process target process PID 1908 set thread context of 1100 1908 WORD.exe WORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exeWORD.exepid process 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe 1908 WORD.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
WORD.exepid process 1100 WORD.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exeWORD.exedescription pid process target process PID 540 wrote to memory of 840 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WScript.exe PID 540 wrote to memory of 840 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WScript.exe PID 540 wrote to memory of 840 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WScript.exe PID 540 wrote to memory of 840 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WScript.exe PID 540 wrote to memory of 1908 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WORD.exe PID 540 wrote to memory of 1908 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WORD.exe PID 540 wrote to memory of 1908 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WORD.exe PID 540 wrote to memory of 1908 540 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WORD.exe PID 1908 wrote to memory of 1100 1908 WORD.exe WORD.exe PID 1908 wrote to memory of 1100 1908 WORD.exe WORD.exe PID 1908 wrote to memory of 1100 1908 WORD.exe WORD.exe PID 1908 wrote to memory of 1100 1908 WORD.exe WORD.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe"C:\Users\Admin\AppData\Local\Temp\5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.vbs"2⤵
- Adds Run key to start application
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exe"C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exeC:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exe"3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1100
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1024B
MD52fe52574926c5de7c5432caf4baa63ce
SHA11b56fcd0750d792bd10d4125dffd0a37420a6829
SHA256f6feb8ea800606ddf3f6962e9769c2a56b3653dc1b42c576281259ab8b5a4751
SHA512f9f70be70a313a394c478e8036f62446f78b41cdb55e657337eb4c1623b44fba83ed60e6dcc59cb54bf20919020e1968cb65647065cacdfd841df2542068d3c7
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6