Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
c9646cb64d64919831475ebef3a562e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9646cb64d64919831475ebef3a562e8.exe
Resource
win10v2004-20240226-en
General
-
Target
c9646cb64d64919831475ebef3a562e8.exe
-
Size
354KB
-
MD5
c9646cb64d64919831475ebef3a562e8
-
SHA1
11492bfad2d8b5c437d6147847c47e1fddb5c920
-
SHA256
0b02dbd1b4dd17aa4f3517aefc2cfb83ead088a85f9d1f2a8b26d3dd69b0c3a6
-
SHA512
11cdfdc950838c24f64eb4720c255b872bad08f1444386f486f74046574a8d7aa32be3c17fa6ff0176b7dfd4a55a9c27df7de8001c08774f2015a993830dfe17
-
SSDEEP
6144:yxgTOM/I1Hf9PBdIhNEhzuFuqUkQTJey+Q//4YL9FIxU8jqGUMuw:wHVP8hNEhzu4qUZfB/4U9KxVjEjw
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Processes:
c9646cb64d64919831475ebef3a562e8.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection c9646cb64d64919831475ebef3a562e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c9646cb64d64919831475ebef3a562e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c9646cb64d64919831475ebef3a562e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c9646cb64d64919831475ebef3a562e8.exe -
Processes:
c9646cb64d64919831475ebef3a562e8.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features c9646cb64d64919831475ebef3a562e8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c9646cb64d64919831475ebef3a562e8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c9646cb64d64919831475ebef3a562e8.exedescription pid process target process PID 2208 set thread context of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2480 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2480 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c9646cb64d64919831475ebef3a562e8.exedescription pid process target process PID 2208 wrote to memory of 2480 2208 c9646cb64d64919831475ebef3a562e8.exe powershell.exe PID 2208 wrote to memory of 2480 2208 c9646cb64d64919831475ebef3a562e8.exe powershell.exe PID 2208 wrote to memory of 2480 2208 c9646cb64d64919831475ebef3a562e8.exe powershell.exe PID 2208 wrote to memory of 2480 2208 c9646cb64d64919831475ebef3a562e8.exe powershell.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe PID 2208 wrote to memory of 2396 2208 c9646cb64d64919831475ebef3a562e8.exe c9646cb64d64919831475ebef3a562e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9646cb64d64919831475ebef3a562e8.exe"C:\Users\Admin\AppData\Local\Temp\c9646cb64d64919831475ebef3a562e8.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\c9646cb64d64919831475ebef3a562e8.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2208-0-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB
-
memory/2208-1-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB
-
memory/2208-2-0x0000000000C40000-0x0000000000C80000-memory.dmpFilesize
256KB
-
memory/2208-3-0x0000000000C40000-0x0000000000C80000-memory.dmpFilesize
256KB
-
memory/2208-27-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB
-
memory/2396-23-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-17-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-28-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-26-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-11-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-13-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-15-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-25-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-19-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2396-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2480-8-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB
-
memory/2480-7-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB
-
memory/2480-10-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB
-
memory/2480-9-0x0000000000280000-0x00000000002C0000-memory.dmpFilesize
256KB
-
memory/2480-6-0x0000000074170000-0x000000007471B000-memory.dmpFilesize
5.7MB