Analysis
-
max time kernel
153s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 16:35
Behavioral task
behavioral1
Sample
NEAS.045848ae3096362920d4a701b216bd30_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.045848ae3096362920d4a701b216bd30_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.045848ae3096362920d4a701b216bd30_JC.exe
-
Size
720KB
-
MD5
045848ae3096362920d4a701b216bd30
-
SHA1
955b04eba6c60c3573e3c557c9725cfdb5c23dce
-
SHA256
4661ac1cd1649de19baa27c5434965705b97b3f6d57e4c72b6db703749fa6c40
-
SHA512
809a73dd36cdf436ec0bf02a388b63d86e890f5665ad0f9f37a6e82aa90b052732685a38ee07f681361e9a7d8942b9e3be029cf9edb8ba4a446290171cf2e894
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi754:arl6kD68JmloO7TdNaPymUi63i62xHLE
Malware Config
Extracted
azorult
http://185.79.156.23/j0n0/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation NEAS.045848ae3096362920d4a701b216bd30_JC.exe -
resource yara_rule behavioral2/memory/2000-0-0x0000000000FA0000-0x0000000001134000-memory.dmp upx behavioral2/memory/2000-23-0x0000000000FA0000-0x0000000001134000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2000-23-0x0000000000FA0000-0x0000000001134000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 2148 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4436 timeout.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2148 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 89 PID 2000 wrote to memory of 2148 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 89 PID 2000 wrote to memory of 2148 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 89 PID 2000 wrote to memory of 2148 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 89 PID 2000 wrote to memory of 2148 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 89 PID 2000 wrote to memory of 3244 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 90 PID 2000 wrote to memory of 3244 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 90 PID 2000 wrote to memory of 3244 2000 NEAS.045848ae3096362920d4a701b216bd30_JC.exe 90 PID 3244 wrote to memory of 4436 3244 cmd.exe 92 PID 3244 wrote to memory of 4436 3244 cmd.exe 92 PID 3244 wrote to memory of 4436 3244 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.045848ae3096362920d4a701b216bd30_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.045848ae3096362920d4a701b216bd30_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:2148
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\NEAS.045848ae3096362920d4a701b216bd30_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\timeout.exeTimeOut 13⤵
- Delays execution with timeout.exe
PID:4436
-
-