Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:35
Behavioral task
behavioral1
Sample
14a8c2f67d92486c89eac26af4d2018d.exe
Resource
win7-20231215-en
General
-
Target
14a8c2f67d92486c89eac26af4d2018d.exe
-
Size
3.1MB
-
MD5
14a8c2f67d92486c89eac26af4d2018d
-
SHA1
0e3ac0615936d2f2b371b751ddc60396c134c0b1
-
SHA256
e561b6430b7eada808e069b7d7eb49c573e1f68007e3c87c4320039a5d599c52
-
SHA512
55f366abda35de1a6af889543e68bc1a56ed2ddcddab1d29387edd3fb552e14fb2c08cc6ee50f7f58b85ab329bb1173b5590fa7f2d70165e716ef0846b17d86c
-
SSDEEP
98304:adNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf85:adNB4ianUstYuUR2CSHsVP85
Malware Config
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 3 IoCs
Processes:
test.exeFile.exetmp.exepid process 1964 test.exe 2896 File.exe 3036 tmp.exe -
Loads dropped DLL 6 IoCs
Processes:
cmd.exetest.exeFile.exepid process 1420 cmd.exe 1964 test.exe 2896 File.exe 2896 File.exe 2896 File.exe 1964 test.exe -
Processes:
resource yara_rule behavioral1/memory/1716-0-0x0000000000400000-0x0000000000B9E000-memory.dmp upx behavioral1/memory/1716-46-0x0000000000400000-0x0000000000B9E000-memory.dmp upx behavioral1/memory/1716-50-0x0000000000400000-0x0000000000B9E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 2 IoCs
Processes:
cmd.execmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
test.exeFile.exepid process 1964 test.exe 2896 File.exe 2896 File.exe 1964 test.exe 2896 File.exe 1964 test.exe 1964 test.exe 2896 File.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
test.exeFile.exedescription pid process Token: SeDebugPrivilege 1964 test.exe Token: SeDebugPrivilege 2896 File.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
14a8c2f67d92486c89eac26af4d2018d.execmd.exetest.exeFile.execmd.execmd.exedescription pid process target process PID 1716 wrote to memory of 1420 1716 14a8c2f67d92486c89eac26af4d2018d.exe cmd.exe PID 1716 wrote to memory of 1420 1716 14a8c2f67d92486c89eac26af4d2018d.exe cmd.exe PID 1716 wrote to memory of 1420 1716 14a8c2f67d92486c89eac26af4d2018d.exe cmd.exe PID 1716 wrote to memory of 1420 1716 14a8c2f67d92486c89eac26af4d2018d.exe cmd.exe PID 1420 wrote to memory of 1964 1420 cmd.exe test.exe PID 1420 wrote to memory of 1964 1420 cmd.exe test.exe PID 1420 wrote to memory of 1964 1420 cmd.exe test.exe PID 1420 wrote to memory of 1964 1420 cmd.exe test.exe PID 1420 wrote to memory of 1964 1420 cmd.exe test.exe PID 1420 wrote to memory of 1964 1420 cmd.exe test.exe PID 1420 wrote to memory of 1964 1420 cmd.exe test.exe PID 1964 wrote to memory of 2896 1964 test.exe File.exe PID 1964 wrote to memory of 2896 1964 test.exe File.exe PID 1964 wrote to memory of 2896 1964 test.exe File.exe PID 1964 wrote to memory of 2896 1964 test.exe File.exe PID 1964 wrote to memory of 2896 1964 test.exe File.exe PID 1964 wrote to memory of 2896 1964 test.exe File.exe PID 1964 wrote to memory of 2896 1964 test.exe File.exe PID 2896 wrote to memory of 3036 2896 File.exe tmp.exe PID 2896 wrote to memory of 3036 2896 File.exe tmp.exe PID 2896 wrote to memory of 3036 2896 File.exe tmp.exe PID 2896 wrote to memory of 3036 2896 File.exe tmp.exe PID 2896 wrote to memory of 2284 2896 File.exe cmd.exe PID 2896 wrote to memory of 2284 2896 File.exe cmd.exe PID 2896 wrote to memory of 2284 2896 File.exe cmd.exe PID 2896 wrote to memory of 2284 2896 File.exe cmd.exe PID 1964 wrote to memory of 1984 1964 test.exe cmd.exe PID 1964 wrote to memory of 1984 1964 test.exe cmd.exe PID 1964 wrote to memory of 1984 1964 test.exe cmd.exe PID 1964 wrote to memory of 1984 1964 test.exe cmd.exe PID 2896 wrote to memory of 2996 2896 File.exe cmd.exe PID 2896 wrote to memory of 2996 2896 File.exe cmd.exe PID 2896 wrote to memory of 2996 2896 File.exe cmd.exe PID 2896 wrote to memory of 2996 2896 File.exe cmd.exe PID 1964 wrote to memory of 3016 1964 test.exe cmd.exe PID 1964 wrote to memory of 3016 1964 test.exe cmd.exe PID 1964 wrote to memory of 3016 1964 test.exe cmd.exe PID 1964 wrote to memory of 3016 1964 test.exe cmd.exe PID 2996 wrote to memory of 2296 2996 cmd.exe reg.exe PID 2996 wrote to memory of 2296 2996 cmd.exe reg.exe PID 2996 wrote to memory of 2296 2996 cmd.exe reg.exe PID 2996 wrote to memory of 2296 2996 cmd.exe reg.exe PID 3016 wrote to memory of 2304 3016 cmd.exe reg.exe PID 3016 wrote to memory of 2304 3016 cmd.exe reg.exe PID 3016 wrote to memory of 2304 3016 cmd.exe reg.exe PID 3016 wrote to memory of 2304 3016 cmd.exe reg.exe PID 1964 wrote to memory of 800 1964 test.exe cmd.exe PID 1964 wrote to memory of 800 1964 test.exe cmd.exe PID 1964 wrote to memory of 800 1964 test.exe cmd.exe PID 1964 wrote to memory of 800 1964 test.exe cmd.exe PID 2896 wrote to memory of 2028 2896 File.exe cmd.exe PID 2896 wrote to memory of 2028 2896 File.exe cmd.exe PID 2896 wrote to memory of 2028 2896 File.exe cmd.exe PID 2896 wrote to memory of 2028 2896 File.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14a8c2f67d92486c89eac26af4d2018d.exe"C:\Users\Admin\AppData\Local\Temp\14a8c2f67d92486c89eac26af4d2018d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y5⤵PID:2284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier5⤵
- NTFS ADS
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f5⤵
- Suspicious use of WriteProcessMemory
PID:2996
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier4⤵
- NTFS ADS
PID:800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/test.exe" "%temp%\FolderN\name.exe" /Y4⤵PID:1984
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f1⤵PID:2304
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5e7b1f5d590a48593db5446f3d95de314
SHA1d7dfc0cf91682da7648f26ed68600a0bdf7de186
SHA256482e8dd34456be6d4b9270f1a88ae9777d51629035c9320dfc553cfbe285376d
SHA512f2f324ae9d1e6bbabf75da6e403aabfa1fc3f6c2f4e3998562066b8abab64b4562c231b29a6234ae879e95bf69900db0d97ad62a82a12d7b8c7635fccae05274
-
Filesize
347KB
MD527cf55b5cccee67651d9470673d97eea
SHA15b056f390dcce7126f0c74ad7fac099bda8a0295
SHA25627d092afeba4c1b27df1dade365f78deef789627bc80c7ff7692eab5eb8811c4
SHA512ae27ad3061731226fbcfb2c34255ab265c55e66fafa003cc046c63d21f0b67566232dfa09b2e1754293a0983bde994fb1feebb6ab11fc09898818f4f911e7bd5
-
Filesize
92KB
MD5b14a170e8ce123d0c0233ee9b4c8682e
SHA10a332bd23e108aea4dba88a969d8e5c7af101902
SHA256dc57abd6afc62d9913d160336310909d44cce02dbbd422d22f3477b9ece4c8d9
SHA51269a120d6979e0951180019be6c08add6b39411d379a9fcbbe81fa99da645a32e04efe93c2a75bb9fc15595f237cfa2b7059ab8f4b52e2502432ee04503428f03