Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 18:22
Static task
static1
Behavioral task
behavioral1
Sample
8791a2b797c21d7830ea9ac9a8a5a5bd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8791a2b797c21d7830ea9ac9a8a5a5bd.exe
Resource
win10v2004-20231222-en
General
-
Target
8791a2b797c21d7830ea9ac9a8a5a5bd.exe
-
Size
1.2MB
-
MD5
8791a2b797c21d7830ea9ac9a8a5a5bd
-
SHA1
64fb146114087b4bcc1fa0ca069bd936bfd81d8e
-
SHA256
20ab52e4380262d3d83ddf0898b715d72d1feca497c566bfb952824cd6c76bc1
-
SHA512
438e530e8481b530318498157627dd594b84e88e689c7409e76fef84175906d62e2d900492beb1f0c94ad8a2d0a4b9ed47e2b93b8a27d2ef74e555cfd7caba51
-
SSDEEP
24576:ydOsBgo0q4wM1BmCmTOUd+L6kbXWi3vEA4r6nNd86:y8oHMDmCm6Ud+zbXt3vs6nz8
Malware Config
Extracted
azorult
http://37.0.10.25/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/836-3-0x00000000003A0000-0x00000000003B2000-memory.dmp CustAttr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8791a2b797c21d7830ea9ac9a8a5a5bd.exedescription pid process target process PID 836 set thread context of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8791a2b797c21d7830ea9ac9a8a5a5bd.exepid process 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8791a2b797c21d7830ea9ac9a8a5a5bd.exedescription pid process Token: SeDebugPrivilege 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
8791a2b797c21d7830ea9ac9a8a5a5bd.exedescription pid process target process PID 836 wrote to memory of 2816 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe schtasks.exe PID 836 wrote to memory of 2816 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe schtasks.exe PID 836 wrote to memory of 2816 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe schtasks.exe PID 836 wrote to memory of 2816 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe schtasks.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe PID 836 wrote to memory of 2712 836 8791a2b797c21d7830ea9ac9a8a5a5bd.exe 8791a2b797c21d7830ea9ac9a8a5a5bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8791a2b797c21d7830ea9ac9a8a5a5bd.exe"C:\Users\Admin\AppData\Local\Temp\8791a2b797c21d7830ea9ac9a8a5a5bd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BzuuSqB" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB54B.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\8791a2b797c21d7830ea9ac9a8a5a5bd.exe"C:\Users\Admin\AppData\Local\Temp\8791a2b797c21d7830ea9ac9a8a5a5bd.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpB54B.tmpFilesize
1KB
MD58179974a76b56bb5e03413a14a711639
SHA1419a76809c8e64349545237dfe14f7f71aa2813e
SHA2564b755f4f7e3e6deecd9d0833a821e93df9fb400517aed353fd0168f36d0db12b
SHA512e05c4d04a3c3c9094d988ffd87ee1adf93a4699f09d6332ccb7107932c1daad79b11764f7e0e37bef0ac85450e51f5d39a5358337712dff2b958d2e4eda791bd
-
memory/836-0-0x00000000010C0000-0x00000000011F0000-memory.dmpFilesize
1.2MB
-
memory/836-1-0x0000000074440000-0x0000000074B2E000-memory.dmpFilesize
6.9MB
-
memory/836-2-0x0000000004F70000-0x0000000004FB0000-memory.dmpFilesize
256KB
-
memory/836-3-0x00000000003A0000-0x00000000003B2000-memory.dmpFilesize
72KB
-
memory/836-4-0x0000000074440000-0x0000000074B2E000-memory.dmpFilesize
6.9MB
-
memory/836-5-0x0000000004F70000-0x0000000004FB0000-memory.dmpFilesize
256KB
-
memory/836-6-0x0000000004940000-0x00000000049AE000-memory.dmpFilesize
440KB
-
memory/836-7-0x00000000009B0000-0x00000000009D8000-memory.dmpFilesize
160KB
-
memory/836-29-0x0000000074440000-0x0000000074B2E000-memory.dmpFilesize
6.9MB
-
memory/2712-15-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-17-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-19-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-21-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-23-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2712-25-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-27-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-28-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-13-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-30-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2712-31-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB