Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:13
Behavioral task
behavioral1
Sample
371268663c923cffb927f6a5d151ff56.exe
Resource
win7-20231129-en
General
-
Target
371268663c923cffb927f6a5d151ff56.exe
-
Size
3.1MB
-
MD5
371268663c923cffb927f6a5d151ff56
-
SHA1
f009c7ae7ff41fcdeda11dcd0323d3a38a026718
-
SHA256
81367795956e95f29bc717f98bbae4e5a568badb8226aafa08774156df2b129f
-
SHA512
4ac459dc845ae3cd69ef0e2591fb3f26e16a54b1cfd2a913fd2691f64612a6858b34cece03613536f26310516b850bbcc222fc091bce8feb415bb985f92ac16d
-
SSDEEP
98304:QdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf83:QdNB4ianUstYuUR2CSHsVP83
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5004-39-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5004-49-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5004-47-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/5004-72-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
test.exeFile.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation test.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation File.exe -
Executes dropped EXE 5 IoCs
Processes:
test.exeFile.exetmp.exesvhost.exesvhost.exepid process 3320 test.exe 1140 File.exe 5016 tmp.exe 2508 svhost.exe 5004 svhost.exe -
Processes:
resource yara_rule behavioral2/memory/1836-0-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral2/memory/1836-25-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral2/memory/1836-77-0x0000000000400000-0x0000000000B9D000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
test.exeFile.exedescription pid process target process PID 3320 set thread context of 5004 3320 test.exe svhost.exe PID 1140 set thread context of 2508 1140 File.exe svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4344 2508 WerFault.exe svhost.exe -
NTFS ADS 2 IoCs
Processes:
cmd.execmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
test.exeFile.exepid process 3320 test.exe 1140 File.exe 1140 File.exe 1140 File.exe 3320 test.exe 3320 test.exe 3320 test.exe 1140 File.exe 3320 test.exe 1140 File.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
test.exeFile.exedescription pid process Token: SeDebugPrivilege 3320 test.exe Token: SeDebugPrivilege 1140 File.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
371268663c923cffb927f6a5d151ff56.execmd.exetest.exeFile.execmd.execmd.exedescription pid process target process PID 1836 wrote to memory of 2148 1836 371268663c923cffb927f6a5d151ff56.exe cmd.exe PID 1836 wrote to memory of 2148 1836 371268663c923cffb927f6a5d151ff56.exe cmd.exe PID 1836 wrote to memory of 2148 1836 371268663c923cffb927f6a5d151ff56.exe cmd.exe PID 2148 wrote to memory of 3320 2148 cmd.exe test.exe PID 2148 wrote to memory of 3320 2148 cmd.exe test.exe PID 2148 wrote to memory of 3320 2148 cmd.exe test.exe PID 3320 wrote to memory of 1140 3320 test.exe File.exe PID 3320 wrote to memory of 1140 3320 test.exe File.exe PID 3320 wrote to memory of 1140 3320 test.exe File.exe PID 1140 wrote to memory of 5016 1140 File.exe tmp.exe PID 1140 wrote to memory of 5016 1140 File.exe tmp.exe PID 1140 wrote to memory of 5016 1140 File.exe tmp.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 3320 wrote to memory of 5004 3320 test.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 2508 1140 File.exe svhost.exe PID 1140 wrote to memory of 1048 1140 File.exe cmd.exe PID 1140 wrote to memory of 1048 1140 File.exe cmd.exe PID 1140 wrote to memory of 1048 1140 File.exe cmd.exe PID 3320 wrote to memory of 2848 3320 test.exe cmd.exe PID 3320 wrote to memory of 2848 3320 test.exe cmd.exe PID 3320 wrote to memory of 2848 3320 test.exe cmd.exe PID 1140 wrote to memory of 1008 1140 File.exe cmd.exe PID 1140 wrote to memory of 1008 1140 File.exe cmd.exe PID 1140 wrote to memory of 1008 1140 File.exe cmd.exe PID 3320 wrote to memory of 1636 3320 test.exe cmd.exe PID 3320 wrote to memory of 1636 3320 test.exe cmd.exe PID 3320 wrote to memory of 1636 3320 test.exe cmd.exe PID 1636 wrote to memory of 4520 1636 cmd.exe reg.exe PID 1636 wrote to memory of 4520 1636 cmd.exe reg.exe PID 1636 wrote to memory of 4520 1636 cmd.exe reg.exe PID 1008 wrote to memory of 4180 1008 cmd.exe reg.exe PID 1008 wrote to memory of 4180 1008 cmd.exe reg.exe PID 1008 wrote to memory of 4180 1008 cmd.exe reg.exe PID 3320 wrote to memory of 1500 3320 test.exe cmd.exe PID 3320 wrote to memory of 1500 3320 test.exe cmd.exe PID 3320 wrote to memory of 1500 3320 test.exe cmd.exe PID 1140 wrote to memory of 2208 1140 File.exe cmd.exe PID 1140 wrote to memory of 2208 1140 File.exe cmd.exe PID 1140 wrote to memory of 2208 1140 File.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\371268663c923cffb927f6a5d151ff56.exe"C:\Users\Admin\AppData\Local\Temp\371268663c923cffb927f6a5d151ff56.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"5⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 3686⤵
- Program crash
PID:4344
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"5⤵
- Executes dropped EXE
PID:5016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y5⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f5⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f6⤵PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier5⤵
- NTFS ADS
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"4⤵
- Executes dropped EXE
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/test.exe" "%temp%\FolderN\name.exe" /Y4⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f5⤵PID:4520
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier4⤵
- NTFS ADS
PID:1500
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2508 -ip 25081⤵PID:696