Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe
Resource
win10v2004-20240709-en
General
-
Target
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe
-
Size
1.5MB
-
MD5
52eac81cc6e67c2a28249295c6bcf3c5
-
SHA1
9f8fba9b7b8404f02f4417169803d369a290910d
-
SHA256
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f
-
SHA512
93109da7b23682f8d7432361cd0f09cf9b98d5b3bc2237fe786393b8e64424395a27888e036af494b129a00900250ff0e1d14e89925bafccc511eac1d52183c3
-
SSDEEP
49152:dTvC/MTQYxsWR7acyejdjIQl6kX7sXf8n0irmNmSb6HCjsZ:RjTQYxsWR5yejdjIQl6kX7sXf8nzrm8l
Malware Config
Extracted
azorult
http://mhlc.shop/MC341/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
resource yara_rule behavioral1/files/0x000b00000001202f-3.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2116 COjMzYH.exe -
Loads dropped DLL 2 IoCs
pid Process 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2480-7-0x0000000000240000-0x00000000003D0000-memory.dmp autoit_exe behavioral1/memory/2480-30-0x0000000000240000-0x00000000003D0000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2480 set thread context of 2768 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 33 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe COjMzYH.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe COjMzYH.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe COjMzYH.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE COjMzYH.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe COjMzYH.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{DDB7E7A7-D625-45EC-93C8-C15199469555}\chrome_installer.exe COjMzYH.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe COjMzYH.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE COjMzYH.exe File opened for modification C:\Program Files\7-Zip\7z.exe COjMzYH.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE COjMzYH.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE COjMzYH.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe COjMzYH.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe COjMzYH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COjMzYH.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2116 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 30 PID 2480 wrote to memory of 2116 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 30 PID 2480 wrote to memory of 2116 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 30 PID 2480 wrote to memory of 2116 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 30 PID 2480 wrote to memory of 2768 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 33 PID 2480 wrote to memory of 2768 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 33 PID 2480 wrote to memory of 2768 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 33 PID 2480 wrote to memory of 2768 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 33 PID 2480 wrote to memory of 2768 2480 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 33 PID 2116 wrote to memory of 2636 2116 COjMzYH.exe 34 PID 2116 wrote to memory of 2636 2116 COjMzYH.exe 34 PID 2116 wrote to memory of 2636 2116 COjMzYH.exe 34 PID 2116 wrote to memory of 2636 2116 COjMzYH.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\COjMzYH.exeC:\Users\Admin\AppData\Local\Temp\COjMzYH.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\524f55cd.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1VX38S3F\k2[1].rar
Filesize4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
189B
MD54a41d425876d1f4e6214bb349e7ae905
SHA1adaab827171944ce737cdc4d1156a45fdcef2519
SHA2563f258cb460350033aacd711d9cb572ffdec0d63f908fd62717302a305095519a
SHA5121a292ad3a042e7833562d947fe318a921b07152f829403f8877b710fd5fac5613dbd1acdd6f38e6ba7e63e89e2939be425ecefd4528a0256c52fc2f11d05b5dc
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3