Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
Lisect_AVT_24003_G1A_55.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Lisect_AVT_24003_G1A_55.exe
Resource
win10v2004-20240709-en
General
-
Target
Lisect_AVT_24003_G1A_55.exe
-
Size
1.5MB
-
MD5
52eac81cc6e67c2a28249295c6bcf3c5
-
SHA1
9f8fba9b7b8404f02f4417169803d369a290910d
-
SHA256
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f
-
SHA512
93109da7b23682f8d7432361cd0f09cf9b98d5b3bc2237fe786393b8e64424395a27888e036af494b129a00900250ff0e1d14e89925bafccc511eac1d52183c3
-
SSDEEP
49152:dTvC/MTQYxsWR7acyejdjIQl6kX7sXf8n0irmNmSb6HCjsZ:RjTQYxsWR5yejdjIQl6kX7sXf8nzrm8l
Malware Config
Extracted
azorult
http://mhlc.shop/MC341/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\COjMzYH.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
COjMzYH.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation COjMzYH.exe -
Executes dropped EXE 1 IoCs
Processes:
COjMzYH.exepid process 2692 COjMzYH.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3716-0-0x0000000000B20000-0x0000000000CB0000-memory.dmp autoit_exe behavioral2/memory/3716-43-0x0000000000B20000-0x0000000000CB0000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Lisect_AVT_24003_G1A_55.exedescription pid process target process PID 3716 set thread context of 1264 3716 Lisect_AVT_24003_G1A_55.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
COjMzYH.exedescription ioc process File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe COjMzYH.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe COjMzYH.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe COjMzYH.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe COjMzYH.exe File opened for modification C:\Program Files\Windows Mail\wab.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe COjMzYH.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe COjMzYH.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe COjMzYH.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe COjMzYH.exe File opened for modification C:\Program Files\dotnet\dotnet.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe COjMzYH.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Solitaire.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe COjMzYH.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE COjMzYH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeLisect_AVT_24003_G1A_55.exeCOjMzYH.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lisect_AVT_24003_G1A_55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COjMzYH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Lisect_AVT_24003_G1A_55.exepid process 3716 Lisect_AVT_24003_G1A_55.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Lisect_AVT_24003_G1A_55.exeCOjMzYH.exedescription pid process target process PID 3716 wrote to memory of 2692 3716 Lisect_AVT_24003_G1A_55.exe COjMzYH.exe PID 3716 wrote to memory of 2692 3716 Lisect_AVT_24003_G1A_55.exe COjMzYH.exe PID 3716 wrote to memory of 2692 3716 Lisect_AVT_24003_G1A_55.exe COjMzYH.exe PID 3716 wrote to memory of 1264 3716 Lisect_AVT_24003_G1A_55.exe svchost.exe PID 3716 wrote to memory of 1264 3716 Lisect_AVT_24003_G1A_55.exe svchost.exe PID 3716 wrote to memory of 1264 3716 Lisect_AVT_24003_G1A_55.exe svchost.exe PID 3716 wrote to memory of 1264 3716 Lisect_AVT_24003_G1A_55.exe svchost.exe PID 2692 wrote to memory of 448 2692 COjMzYH.exe cmd.exe PID 2692 wrote to memory of 448 2692 COjMzYH.exe cmd.exe PID 2692 wrote to memory of 448 2692 COjMzYH.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lisect_AVT_24003_G1A_55.exe"C:\Users\Admin\AppData\Local\Temp\Lisect_AVT_24003_G1A_55.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\COjMzYH.exeC:\Users\Admin\AppData\Local\Temp\COjMzYH.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\715113e5.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Lisect_AVT_24003_G1A_55.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
189B
MD51f9cb763d2fc9e7768bdf79958215430
SHA19bd51bdf38a3c685c17630b642dd0cf6ff8718c7
SHA256a1b32dc768524bf97f38729d934100fa4a483a2d2fd09c58109b2044868d398e
SHA512729bfad6897354e66ed24762567c39f97b755a9b38621092a4cf4f459ea08d686ac2d7662ebbd54cafdfcb51015e1ff88b21d7897f47b378788778c03790f6e6
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3