Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
bf4f7264ef324c5c14dccd8679685d3f.exe
Resource
win7-20240221-en
General
-
Target
bf4f7264ef324c5c14dccd8679685d3f.exe
-
Size
749KB
-
MD5
bf4f7264ef324c5c14dccd8679685d3f
-
SHA1
055a91cacfa6756ae1bf9d603ddea5e9b1b8f684
-
SHA256
8fdc412291f33a96a35c93d3d2bf03b338054509cd855f60109809a8e74100fe
-
SHA512
703b160a1ea781c12540f4bbba970b1d5d60be2bb83b0982cfb7b6e7b0db7d6cd50637c6c5a9cde433dc353f7228d157ec0400789272a47833c3d08438805e90
-
SSDEEP
12288:nUOTuurJr8VWrdMi4/Bfj+fqQ0eaQWH4X1/t6obHX8Rk+e8MTgtNxtxiF1kgDWS/:jrGVG2ZeaElv8lHz
Malware Config
Extracted
azorult
http://aka-mining.com/wordpress@/index.php
Extracted
asyncrat
0.5.7B
noip
rocking.ddns.net:55714
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
image.exe
-
install_folder
%Temp%
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/756-7-0x00000000058D0000-0x00000000058E6000-memory.dmp family_zgrat_v1 -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a0000000231e9-19.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation AsyncClient_noip.exe -
Executes dropped EXE 3 IoCs
pid Process 3048 AsyncClient_noip.exe 4632 http.exe 1440 image.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 756 set thread context of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1652 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 464 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe 3048 AsyncClient_noip.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3048 AsyncClient_noip.exe Token: SeDebugPrivilege 1440 image.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2128 RegAsm.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 756 wrote to memory of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 PID 756 wrote to memory of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 PID 756 wrote to memory of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 PID 756 wrote to memory of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 PID 756 wrote to memory of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 PID 756 wrote to memory of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 PID 756 wrote to memory of 2128 756 bf4f7264ef324c5c14dccd8679685d3f.exe 92 PID 2128 wrote to memory of 3048 2128 RegAsm.exe 93 PID 2128 wrote to memory of 3048 2128 RegAsm.exe 93 PID 2128 wrote to memory of 3048 2128 RegAsm.exe 93 PID 2128 wrote to memory of 4632 2128 RegAsm.exe 94 PID 2128 wrote to memory of 4632 2128 RegAsm.exe 94 PID 2128 wrote to memory of 4632 2128 RegAsm.exe 94 PID 3048 wrote to memory of 540 3048 AsyncClient_noip.exe 95 PID 3048 wrote to memory of 540 3048 AsyncClient_noip.exe 95 PID 3048 wrote to memory of 540 3048 AsyncClient_noip.exe 95 PID 3048 wrote to memory of 3804 3048 AsyncClient_noip.exe 96 PID 3048 wrote to memory of 3804 3048 AsyncClient_noip.exe 96 PID 3048 wrote to memory of 3804 3048 AsyncClient_noip.exe 96 PID 3804 wrote to memory of 464 3804 cmd.exe 99 PID 3804 wrote to memory of 464 3804 cmd.exe 99 PID 3804 wrote to memory of 464 3804 cmd.exe 99 PID 540 wrote to memory of 1652 540 cmd.exe 100 PID 540 wrote to memory of 1652 540 cmd.exe 100 PID 540 wrote to memory of 1652 540 cmd.exe 100 PID 3804 wrote to memory of 1440 3804 cmd.exe 101 PID 3804 wrote to memory of 1440 3804 cmd.exe 101 PID 3804 wrote to memory of 1440 3804 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf4f7264ef324c5c14dccd8679685d3f.exe"C:\Users\Admin\AppData\Local\Temp\bf4f7264ef324c5c14dccd8679685d3f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\AsyncClient_noip.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient_noip.exe" 03⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "image" /tr '"C:\Users\Admin\AppData\Local\Temp\image.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "image" /tr '"C:\Users\Admin\AppData\Local\Temp\image.exe"'5⤵
- Creates scheduled task(s)
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp3FC8.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\image.exe"C:\Users\Admin\AppData\Local\Temp\image.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\http.exe"C:\Users\Admin\AppData\Local\Temp\http.exe" 03⤵
- Executes dropped EXE
PID:4632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD58c3cdf82f84a31b497d1373b787fd9bb
SHA1168da558ad0428adc45a480e3e4cee4bda362c4c
SHA256b26c1263561c56c98692762c18a0705bcf3b181f0ffc0681f7e9e3666b7036da
SHA51283449e8d7a27512735b5c1b3158bd2b45fb72d1ae8ac8b6dc3cd0938c9ea0d4667b85817ed034d2e9ff32bafbca2bca131615cebc11a8a210c6d87268a5821f6
-
Filesize
112KB
MD5df42290ca661cacdbbd4c1a819ddfa15
SHA1cf4fe62f6157f61f7e737dc46c913037587d0d56
SHA2565b81be074935e496d7cfad72e6493986abd804adb37f3c7de41230c662968dbe
SHA512f6f289bf5935e8f01e3357155b95f9bdae6935eb98eb50322770bf437890b02a27f052cca6659029fc3773142a95c52a035e5019421f320572c3a12ba13428a8
-
Filesize
152B
MD53bb051858622805727f75dc626b835f2
SHA1670b75408f6f4ba9c9973932db6cf9b6435b78cd
SHA256d68ab47c83c797c8e23c9f4709e2787c73cb33302130284a7908a03ac9ae60d7
SHA51209be6576b59bb6bacbdccf3f0bcf536ae3854e7bb68e017449cd78850ea192cc702b882214b1791677bf6303298e57da05abb0545e538e49c77b56d81162bdee