Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/07/2024, 13:00

General

  • Target

    Azorult.exe

  • Size

    851KB

  • MD5

    0824428fdccf3c63fc1ca19a1dd7ef74

  • SHA1

    1ad8480cc56e94153a22d46a5a6020dc27052ae2

  • SHA256

    90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7

  • SHA512

    9ee92aea5d688b48e632ad8f8d0bb1402480b413ecf51fe03e4618f979e787fea6e98d4287f0acdeada129db91929401bccafd27d642cfe460d52adafc16f08f

  • SSDEEP

    12288:Dt7ExDo//OtX1lxawkeVCGmQzVuoLZJifcIj1+43oOdwI+BDV8AGDixNJIu4f:NYDoeMwkejuoLDifvjM43oOdoBDlTI5f

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Azorult.exe
    "C:\Users\Admin\AppData\Local\Temp\Azorult.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Nummmeret=Get-Content 'C:\Users\Admin\AppData\Local\Temp\forgrovelse\konstituerendes\Printermanualens.Ear';$Trojanerens=$Nummmeret.SubString(42833,3);.$Trojanerens($Nummmeret) "
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2700
        3⤵
        • Program crash
        PID:7096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fn0rjidh.5gx.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\forgrovelse\konstituerendes\Printermanualens.Ear

    Filesize

    71KB

    MD5

    554eea34b8289a002b329177470ec6fc

    SHA1

    8160ab32701d1ad3afb95211d172f4178602a4f3

    SHA256

    813bc39531cbd5766ecc0edb322fbef276977c20c19aca1c038500ab8c1215d7

    SHA512

    5c199426a01b77088fb874c96d1aec2fbbdefea5a44d94cc115452b8b26e3256bfc14bf37c27189ce8463d3e9fe637efebaaf563cbf26c4760bec66b77af4566

  • memory/2252-19-0x0000000007F20000-0x0000000007F96000-memory.dmp

    Filesize

    472KB

  • memory/2252-9-0x0000000072E90000-0x000000007357E000-memory.dmp

    Filesize

    6.9MB

  • memory/2252-11-0x0000000006EE0000-0x0000000006F02000-memory.dmp

    Filesize

    136KB

  • memory/2252-12-0x0000000007060000-0x00000000070C6000-memory.dmp

    Filesize

    408KB

  • memory/2252-13-0x0000000006F80000-0x0000000006FE6000-memory.dmp

    Filesize

    408KB

  • memory/2252-14-0x0000000007820000-0x0000000007B70000-memory.dmp

    Filesize

    3.3MB

  • memory/2252-17-0x0000000007B70000-0x0000000007B8C000-memory.dmp

    Filesize

    112KB

  • memory/2252-18-0x0000000007FC0000-0x000000000800B000-memory.dmp

    Filesize

    300KB

  • memory/2252-5-0x0000000072E9E000-0x0000000072E9F000-memory.dmp

    Filesize

    4KB

  • memory/2252-10-0x00000000070E0000-0x0000000007708000-memory.dmp

    Filesize

    6.2MB

  • memory/2252-34-0x0000000008E20000-0x0000000008EB4000-memory.dmp

    Filesize

    592KB

  • memory/2252-35-0x0000000008DB0000-0x0000000008DCA000-memory.dmp

    Filesize

    104KB

  • memory/2252-36-0x0000000008EC0000-0x0000000008EE2000-memory.dmp

    Filesize

    136KB

  • memory/2252-37-0x00000000096B0000-0x0000000009BAE000-memory.dmp

    Filesize

    5.0MB

  • memory/2252-8-0x0000000004460000-0x0000000004496000-memory.dmp

    Filesize

    216KB

  • memory/2252-43-0x000000000A230000-0x000000000A8A8000-memory.dmp

    Filesize

    6.5MB

  • memory/2252-14000-0x0000000072E9E000-0x0000000072E9F000-memory.dmp

    Filesize

    4KB

  • memory/2252-14001-0x0000000072E90000-0x000000007357E000-memory.dmp

    Filesize

    6.9MB