Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 18:21
Behavioral task
behavioral1
Sample
83c240334d59ab179ce55d8700b2dd60.exe
Resource
win7-20231215-en
General
-
Target
83c240334d59ab179ce55d8700b2dd60.exe
-
Size
3.1MB
-
MD5
83c240334d59ab179ce55d8700b2dd60
-
SHA1
80c7975a06cd812c8ff577194e4c0d53e76e738f
-
SHA256
567f28eba91363ccb4e919ea9a9d0171cfb1efe9957a836fdc76ab5dd23b3204
-
SHA512
d199634714fb7886d8dd7499f56a963b5fc4b6eed8172bf84afa28f4f098efd455b1494116931544d078966106062583b0dcc66a06a98d9a3ea18f3e7fa7fbba
-
SSDEEP
98304:tdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8x:tdNB4ianUstYuUR2CSHsVP8x
Malware Config
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1316-38-0x0000000000080000-0x00000000000B3000-memory.dmp netwire behavioral1/memory/1316-36-0x0000000000080000-0x00000000000B3000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
pid Process 1724 test.exe 2448 File.exe 2864 tmp.exe -
Loads dropped DLL 5 IoCs
pid Process 1700 cmd.exe 1724 test.exe 2448 File.exe 2448 File.exe 2448 File.exe -
resource yara_rule behavioral1/memory/2212-1-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/memory/2212-47-0x0000000000400000-0x0000000000B9D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1724 test.exe 2448 File.exe 2448 File.exe 2448 File.exe 2448 File.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1724 test.exe Token: SeDebugPrivilege 2448 File.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe 15 PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe 15 PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe 15 PID 2212 wrote to memory of 1700 2212 83c240334d59ab179ce55d8700b2dd60.exe 15 PID 1700 wrote to memory of 1724 1700 cmd.exe 17 PID 1700 wrote to memory of 1724 1700 cmd.exe 17 PID 1700 wrote to memory of 1724 1700 cmd.exe 17 PID 1700 wrote to memory of 1724 1700 cmd.exe 17 PID 1700 wrote to memory of 1724 1700 cmd.exe 17 PID 1700 wrote to memory of 1724 1700 cmd.exe 17 PID 1700 wrote to memory of 1724 1700 cmd.exe 17 PID 1724 wrote to memory of 2448 1724 test.exe 16 PID 1724 wrote to memory of 2448 1724 test.exe 16 PID 1724 wrote to memory of 2448 1724 test.exe 16 PID 1724 wrote to memory of 2448 1724 test.exe 16 PID 1724 wrote to memory of 2448 1724 test.exe 16 PID 1724 wrote to memory of 2448 1724 test.exe 16 PID 1724 wrote to memory of 2448 1724 test.exe 16 PID 2448 wrote to memory of 2864 2448 File.exe 41 PID 2448 wrote to memory of 2864 2448 File.exe 41 PID 2448 wrote to memory of 2864 2448 File.exe 41 PID 2448 wrote to memory of 2864 2448 File.exe 41 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 1724 wrote to memory of 1316 1724 test.exe 40 PID 2448 wrote to memory of 2596 2448 File.exe 39 PID 2448 wrote to memory of 2596 2448 File.exe 39 PID 2448 wrote to memory of 2596 2448 File.exe 39 PID 2448 wrote to memory of 2596 2448 File.exe 39 PID 2448 wrote to memory of 2124 2448 File.exe 37 PID 2448 wrote to memory of 2124 2448 File.exe 37 PID 2448 wrote to memory of 2124 2448 File.exe 37 PID 2448 wrote to memory of 2124 2448 File.exe 37 PID 2124 wrote to memory of 3036 2124 cmd.exe 35 PID 2124 wrote to memory of 3036 2124 cmd.exe 35 PID 2124 wrote to memory of 3036 2124 cmd.exe 35 PID 2124 wrote to memory of 3036 2124 cmd.exe 35 PID 2448 wrote to memory of 1628 2448 File.exe 34 PID 2448 wrote to memory of 1628 2448 File.exe 34 PID 2448 wrote to memory of 1628 2448 File.exe 34 PID 2448 wrote to memory of 1628 2448 File.exe 34
Processes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"3⤵PID:1316
-
-
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier2⤵
- NTFS ADS
PID:1628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y2⤵PID:2596
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\83c240334d59ab179ce55d8700b2dd60.exe"C:\Users\Admin\AppData\Local\Temp\83c240334d59ab179ce55d8700b2dd60.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f1⤵PID:3036