Analysis
-
max time kernel
138s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 12:48
Static task
static1
Behavioral task
behavioral1
Sample
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe
Resource
win10v2004-20240709-en
General
-
Target
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe
-
Size
1.5MB
-
MD5
52eac81cc6e67c2a28249295c6bcf3c5
-
SHA1
9f8fba9b7b8404f02f4417169803d369a290910d
-
SHA256
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f
-
SHA512
93109da7b23682f8d7432361cd0f09cf9b98d5b3bc2237fe786393b8e64424395a27888e036af494b129a00900250ff0e1d14e89925bafccc511eac1d52183c3
-
SSDEEP
49152:dTvC/MTQYxsWR7acyejdjIQl6kX7sXf8n0irmNmSb6HCjsZ:RjTQYxsWR5yejdjIQl6kX7sXf8nzrm8l
Malware Config
Extracted
azorult
http://mhlc.shop/MC341/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\COjMzYH.exe aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
COjMzYH.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation COjMzYH.exe -
Executes dropped EXE 1 IoCs
Processes:
COjMzYH.exepid process 3036 COjMzYH.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4256-0-0x0000000000220000-0x00000000003B0000-memory.dmp autoit_exe behavioral2/memory/3756-18-0x0000000000220000-0x00000000003B0000-memory.dmp autoit_exe behavioral2/memory/4256-19-0x0000000000220000-0x00000000003B0000-memory.dmp autoit_exe behavioral2/memory/3756-41-0x0000000000220000-0x00000000003B0000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exedescription pid process target process PID 3756 set thread context of 316 3756 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
COjMzYH.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Solitaire.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe COjMzYH.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe COjMzYH.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE COjMzYH.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe COjMzYH.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe COjMzYH.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe COjMzYH.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe COjMzYH.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\chrome_pwa_launcher.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe COjMzYH.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe COjMzYH.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe COjMzYH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exeCOjMzYH.exe062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.execmd.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COjMzYH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exepid process 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 3756 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exeCOjMzYH.exe062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exedescription pid process target process PID 4256 wrote to memory of 3036 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe COjMzYH.exe PID 4256 wrote to memory of 3036 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe COjMzYH.exe PID 4256 wrote to memory of 3036 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe COjMzYH.exe PID 4256 wrote to memory of 1456 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe PID 4256 wrote to memory of 1456 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe PID 4256 wrote to memory of 1456 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe PID 4256 wrote to memory of 3756 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe PID 4256 wrote to memory of 3756 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe PID 4256 wrote to memory of 3756 4256 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe PID 3036 wrote to memory of 4968 3036 COjMzYH.exe cmd.exe PID 3036 wrote to memory of 4968 3036 COjMzYH.exe cmd.exe PID 3036 wrote to memory of 4968 3036 COjMzYH.exe cmd.exe PID 3756 wrote to memory of 316 3756 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe PID 3756 wrote to memory of 316 3756 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe PID 3756 wrote to memory of 316 3756 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe PID 3756 wrote to memory of 316 3756 062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\COjMzYH.exeC:\Users\Admin\AppData\Local\Temp\COjMzYH.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2f156d3b.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"2⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe"3⤵
- System Location Discovery: System Language Discovery
PID:316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189B
MD5a67cb4d3fb5eeff79dca6cbab7c2fedd
SHA1688d9f54a66b7421bf33dc679a948aa866da45a2
SHA2563277498f4413a01039492cf5e5e9cc6679f51c622e72ee6ba35043de385d3c0f
SHA5128f1e5386fb4f7763a230c086cb0379e089e44b0dddc3315aa0afe0d0d1988d123df91ce875e489c463c2179c642f38f16272086c5dc0ed5deeeb8ea8e302ac0c
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3
-
Filesize
29KB
MD5251b67c03269eb0a26b3ebd29d3f674d
SHA1eb191243b6882ec350ee2a68af519ed4c9ecc042
SHA2565becee88f98eadfe9c31755f907dd9d7abf761dc5c04f06282a770a51832a9c1
SHA5129cac3a4132d28fd60e6e5adf261fad7a7b5a0424008124b5d326dddc55152f974412ac5449c9379b6b4c62f1e6dacbabf597c0ea86454ef0225d72d7f6fecc1f
-
Filesize
112KB
MD5eb5e42dab0099a065bc419f2f2625b2d
SHA1648e16a47742676e52092ee09a7b7fb85c141702
SHA2567719810f0a3fd0e38426ae3f4252cf518288e93d360817a596379768aa33e404
SHA51276597e969537b07695703e85412587655ab5707091d232c17a73ac6320f196132c443ccd1eeca34e747bc8b02a1e3497a3e5c23217cf481a83944e46cd8d7240