Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 20:43
Static task
static1
Behavioral task
behavioral1
Sample
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe
Resource
win10v2004-20220721-en
General
-
Target
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe
-
Size
1.7MB
-
MD5
746f7df0c1d2ff1c7c4fe90e3a24ae48
-
SHA1
934a527ae8b8cdeaaf49b90193a9fcc1ae925854
-
SHA256
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
-
SHA512
533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
Malware Config
Extracted
azorult
http://104.233.105.159/0/van/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
WORD.exeWORD.exepid process 3452 WORD.exe 392 WORD.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WORD = "C:\\Users\\Admin\\AppData\\Local\\Temp\\OFFICE\\WORD.vbs -VA" WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
WORD.exedescription pid process target process PID 3452 set thread context of 392 3452 WORD.exe WORD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000_Classes\Local Settings 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exeWORD.exepid process 3028 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe 3452 WORD.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exeWORD.exedescription pid process target process PID 3028 wrote to memory of 1124 3028 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WScript.exe PID 3028 wrote to memory of 1124 3028 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WScript.exe PID 3028 wrote to memory of 1124 3028 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WScript.exe PID 3028 wrote to memory of 3452 3028 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WORD.exe PID 3028 wrote to memory of 3452 3028 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WORD.exe PID 3028 wrote to memory of 3452 3028 5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe WORD.exe PID 3452 wrote to memory of 392 3452 WORD.exe WORD.exe PID 3452 wrote to memory of 392 3452 WORD.exe WORD.exe PID 3452 wrote to memory of 392 3452 WORD.exe WORD.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe"C:\Users\Admin\AppData\Local\Temp\5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.vbs"2⤵
- Adds Run key to start application
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exe"C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exeC:\Users\Admin\AppData\Local\Temp\OFFICE\WORD.exe"3⤵
- Executes dropped EXE
PID:392
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1.7MB
MD5746f7df0c1d2ff1c7c4fe90e3a24ae48
SHA1934a527ae8b8cdeaaf49b90193a9fcc1ae925854
SHA2565e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8
SHA512533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6
-
Filesize
1024B
MD52fe52574926c5de7c5432caf4baa63ce
SHA11b56fcd0750d792bd10d4125dffd0a37420a6829
SHA256f6feb8ea800606ddf3f6962e9769c2a56b3653dc1b42c576281259ab8b5a4751
SHA512f9f70be70a313a394c478e8036f62446f78b41cdb55e657337eb4c1623b44fba83ed60e6dcc59cb54bf20919020e1968cb65647065cacdfd841df2542068d3c7