Resubmissions
06-12-2023 15:44
231206-s6hkmsea7x 1016-11-2023 20:24
231116-y6snhage4w 1005-04-2023 06:56
230405-hqtymacc52 1004-04-2023 08:02
230404-jw4wfsdf69 10Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-12-2023 15:44
Static task
static1
Behavioral task
behavioral1
Sample
??????????? ??????????????.exe
Resource
win11-20231128-en
Errors
General
-
Target
??????????? ??????????????.exe
-
Size
234KB
-
MD5
38d378ff52ea3dba53a07eee3ed769c7
-
SHA1
94181ebcbe353d496701681b6bd03e06c1c63751
-
SHA256
0791c43de42272d1f5eb20ee67b0ad4194e2bb8f00975aa906605d8cd0c4c6a4
-
SHA512
ab096595c92f3bca5659b2156e3daed47f70dd8ab3ddff1506ff164a50fa4d15f2503776d43633056ebcb569255295f8f7af53a031f552da1a3f73d017c105cc
-
SSDEEP
6144:gYa6oBsctoZqfq4S4JV2p9wubvEjRTsObhUXLbPp:gYxcCZqHp2prEVs+C7F
Malware Config
Extracted
azorult
http://141.98.6.162/office/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
jjhluxw.exejjhluxw.exepid process 3352 jjhluxw.exe 4836 jjhluxw.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jjhluxw.exedescription pid process target process PID 3352 set thread context of 4836 3352 jjhluxw.exe jjhluxw.exe -
Drops file in Windows directory 4 IoCs
Processes:
UserOOBEBroker.exedescription ioc process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "124" LogonUI.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3648 WINWORD.EXE 3648 WINWORD.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
jjhluxw.exepid process 3352 jjhluxw.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
WINWORD.EXELogonUI.exepid process 3648 WINWORD.EXE 3648 WINWORD.EXE 3648 WINWORD.EXE 3648 WINWORD.EXE 3648 WINWORD.EXE 3648 WINWORD.EXE 3648 WINWORD.EXE 3648 WINWORD.EXE 4996 LogonUI.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
___________ ______________.exejjhluxw.exedescription pid process target process PID 4312 wrote to memory of 3352 4312 ___________ ______________.exe jjhluxw.exe PID 4312 wrote to memory of 3352 4312 ___________ ______________.exe jjhluxw.exe PID 4312 wrote to memory of 3352 4312 ___________ ______________.exe jjhluxw.exe PID 3352 wrote to memory of 4836 3352 jjhluxw.exe jjhluxw.exe PID 3352 wrote to memory of 4836 3352 jjhluxw.exe jjhluxw.exe PID 3352 wrote to memory of 4836 3352 jjhluxw.exe jjhluxw.exe PID 3352 wrote to memory of 4836 3352 jjhluxw.exe jjhluxw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\___________ ______________.exe"C:\Users\Admin\AppData\Local\Temp\___________ ______________.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\jjhluxw.exe"C:\Users\Admin\AppData\Local\Temp\jjhluxw.exe" C:\Users\Admin\AppData\Local\Temp\izwmcwjt.yhc2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\jjhluxw.exe"C:\Users\Admin\AppData\Local\Temp\jjhluxw.exe"3⤵
- Executes dropped EXE
PID:4836
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Opened.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4528
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:1616
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:2432
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38c0855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD519e06b8c8c60c69e11228b250568400a
SHA17c49e0aca8637c2adf258f98b1e7e45bcefaef53
SHA256fb8e5832ac5a98dd0ab1030628a559627279ae256593510b0fbc6da2a43f2ad8
SHA512e67eaebb28cab7784446cc3fbbdfb8fa3c4229225e4abdff26091a65f8adf8a912414a0bedd4b0458594776814c14f0f9cf9f18c71e3d3a75bef70b2056a389c
-
Filesize
108KB
MD55f16ae72eb6fbd3040d5d3c18c5ac304
SHA14e1604b5e763aa9f336996c75cb3e8436f16850f
SHA2563b22459608be3d78066a25fdf807f6628de79c01799cd5e03095c2ae996bca16
SHA5127ca61d0f536638094b67f8c7b12ab5ff4d234299f2365ab9cd7de78bd1d257195b6c112039761e2620a597a65d59cfd856790db075bef6d69afdaeb35d49286d
-
Filesize
108KB
MD55f16ae72eb6fbd3040d5d3c18c5ac304
SHA14e1604b5e763aa9f336996c75cb3e8436f16850f
SHA2563b22459608be3d78066a25fdf807f6628de79c01799cd5e03095c2ae996bca16
SHA5127ca61d0f536638094b67f8c7b12ab5ff4d234299f2365ab9cd7de78bd1d257195b6c112039761e2620a597a65d59cfd856790db075bef6d69afdaeb35d49286d
-
Filesize
108KB
MD55f16ae72eb6fbd3040d5d3c18c5ac304
SHA14e1604b5e763aa9f336996c75cb3e8436f16850f
SHA2563b22459608be3d78066a25fdf807f6628de79c01799cd5e03095c2ae996bca16
SHA5127ca61d0f536638094b67f8c7b12ab5ff4d234299f2365ab9cd7de78bd1d257195b6c112039761e2620a597a65d59cfd856790db075bef6d69afdaeb35d49286d
-
Filesize
132KB
MD5f495dbd405842d0cee36e9ff9d3be29e
SHA135e5f6e880f2069a94d7cfa8847040fb1bb0c8e9
SHA256aa7ec70ab30285dcd735aa0c1feb12729c10198a4eb2ebcce50e3a1afca58da4
SHA51244fd0a274c612094c150be66d4ab447d474f81900388fc8b1dbc9828a195bc43a05f6337132a1438612a6f329cc99880dba3c6eb997755e02713d877cc675e8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5827b64ac76db73ca12b583996c1d7fdc
SHA13885af33bef5d0a34a05758ba6252fa75264df33
SHA2561915f83ac37c12553bf0d2451027a4c9a0a126435dc2fd7ad3e95cfcbd94a1e7
SHA5129051cc3b9d3683fd9edc74536dfcdc17cd88f7237479d4478b0658f1c82fb163cdd7fc847c24559ba3cfcb144fe245cc9fca8509b07a5143e6fb61f60a2faf52
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5928cac767268f96acd0b13715428ade9
SHA19ba3780254c4ff463878307391494b926dfb3733
SHA256815026181f786b2f0e70272d6ed844eb812294fda17ff59edfe60a115dec4f7a
SHA5122f58d6f0e0399bb7f788ebdcc484d361a9da8799b0f9ef1b877bb2eb1c02bf71f5686ce18488c1c7958782e235ab95876a667dc7fce0c9f322bcd84183a75dff