Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 18:21
Behavioral task
behavioral1
Sample
83c240334d59ab179ce55d8700b2dd60.exe
Resource
win7-20231215-en
General
-
Target
83c240334d59ab179ce55d8700b2dd60.exe
-
Size
3.1MB
-
MD5
83c240334d59ab179ce55d8700b2dd60
-
SHA1
80c7975a06cd812c8ff577194e4c0d53e76e738f
-
SHA256
567f28eba91363ccb4e919ea9a9d0171cfb1efe9957a836fdc76ab5dd23b3204
-
SHA512
d199634714fb7886d8dd7499f56a963b5fc4b6eed8172bf84afa28f4f098efd455b1494116931544d078966106062583b0dcc66a06a98d9a3ea18f3e7fa7fbba
-
SSDEEP
98304:tdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8x:tdNB4ianUstYuUR2CSHsVP8x
Malware Config
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1316-38-0x0000000000080000-0x00000000000B3000-memory.dmp netwire behavioral1/memory/1316-36-0x0000000000080000-0x00000000000B3000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
test.exeFile.exetmp.exepid process 1724 test.exe 2448 File.exe 2864 tmp.exe -
Loads dropped DLL 5 IoCs
Processes:
cmd.exetest.exeFile.exepid process 1700 cmd.exe 1724 test.exe 2448 File.exe 2448 File.exe 2448 File.exe -
Processes:
resource yara_rule behavioral1/memory/2212-1-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/memory/2212-47-0x0000000000400000-0x0000000000B9D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
test.exeFile.exepid process 1724 test.exe 2448 File.exe 2448 File.exe 2448 File.exe 2448 File.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
test.exeFile.exedescription pid process Token: SeDebugPrivilege 1724 test.exe Token: SeDebugPrivilege 2448 File.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
83c240334d59ab179ce55d8700b2dd60.execmd.exetest.exeFile.execmd.exedescription pid process target process PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe cmd.exe PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe cmd.exe PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe cmd.exe PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe cmd.exe PID 1700 wrote to memory of 1724 1700 cmd.exe test.exe PID 1700 wrote to memory of 1724 1700 cmd.exe test.exe PID 1700 wrote to memory of 1724 1700 cmd.exe test.exe PID 1700 wrote to memory of 1724 1700 cmd.exe test.exe PID 1700 wrote to memory of 1724 1700 cmd.exe test.exe PID 1700 wrote to memory of 1724 1700 cmd.exe test.exe PID 1700 wrote to memory of 1724 1700 cmd.exe test.exe PID 1724 wrote to memory of 2448 1724 test.exe File.exe PID 1724 wrote to memory of 2448 1724 test.exe File.exe PID 1724 wrote to memory of 2448 1724 test.exe File.exe PID 1724 wrote to memory of 2448 1724 test.exe File.exe PID 1724 wrote to memory of 2448 1724 test.exe File.exe PID 1724 wrote to memory of 2448 1724 test.exe File.exe PID 1724 wrote to memory of 2448 1724 test.exe File.exe PID 2448 wrote to memory of 2864 2448 File.exe tmp.exe PID 2448 wrote to memory of 2864 2448 File.exe tmp.exe PID 2448 wrote to memory of 2864 2448 File.exe tmp.exe PID 2448 wrote to memory of 2864 2448 File.exe tmp.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 1724 wrote to memory of 1316 1724 test.exe svhost.exe PID 2448 wrote to memory of 2596 2448 File.exe cmd.exe PID 2448 wrote to memory of 2596 2448 File.exe cmd.exe PID 2448 wrote to memory of 2596 2448 File.exe cmd.exe PID 2448 wrote to memory of 2596 2448 File.exe cmd.exe PID 2448 wrote to memory of 2124 2448 File.exe cmd.exe PID 2448 wrote to memory of 2124 2448 File.exe cmd.exe PID 2448 wrote to memory of 2124 2448 File.exe cmd.exe PID 2448 wrote to memory of 2124 2448 File.exe cmd.exe PID 2124 wrote to memory of 3036 2124 cmd.exe reg.exe PID 2124 wrote to memory of 3036 2124 cmd.exe reg.exe PID 2124 wrote to memory of 3036 2124 cmd.exe reg.exe PID 2124 wrote to memory of 3036 2124 cmd.exe reg.exe PID 2448 wrote to memory of 1628 2448 File.exe cmd.exe PID 2448 wrote to memory of 1628 2448 File.exe cmd.exe PID 2448 wrote to memory of 1628 2448 File.exe cmd.exe PID 2448 wrote to memory of 1628 2448 File.exe cmd.exe
Processes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"3⤵PID:1316
-
-
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier2⤵
- NTFS ADS
PID:1628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y2⤵PID:2596
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\83c240334d59ab179ce55d8700b2dd60.exe"C:\Users\Admin\AppData\Local\Temp\83c240334d59ab179ce55d8700b2dd60.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f1⤵PID:3036