Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/07/2024, 13:00
Static task
static1
General
-
Target
Azorult.exe
-
Size
851KB
-
MD5
0824428fdccf3c63fc1ca19a1dd7ef74
-
SHA1
1ad8480cc56e94153a22d46a5a6020dc27052ae2
-
SHA256
90a82defe606e51d2826265a43737130682b738241700782d7e41188475b7fb7
-
SHA512
9ee92aea5d688b48e632ad8f8d0bb1402480b413ecf51fe03e4618f979e787fea6e98d4287f0acdeada129db91929401bccafd27d642cfe460d52adafc16f08f
-
SSDEEP
12288:Dt7ExDo//OtX1lxawkeVCGmQzVuoLZJifcIj1+43oOdwI+BDV8AGDixNJIu4f:NYDoeMwkejuoLDifvjM43oOdoBDlTI5f
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2252 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Anraabelsens\Hyposternal.udk Azorult.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 7096 2252 WerFault.exe 72 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Azorult.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe 2252 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2252 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2252 2468 Azorult.exe 72 PID 2468 wrote to memory of 2252 2468 Azorult.exe 72 PID 2468 wrote to memory of 2252 2468 Azorult.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\Azorult.exe"C:\Users\Admin\AppData\Local\Temp\Azorult.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Nummmeret=Get-Content 'C:\Users\Admin\AppData\Local\Temp\forgrovelse\konstituerendes\Printermanualens.Ear';$Trojanerens=$Nummmeret.SubString(42833,3);.$Trojanerens($Nummmeret) "2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 27003⤵
- Program crash
PID:7096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
71KB
MD5554eea34b8289a002b329177470ec6fc
SHA18160ab32701d1ad3afb95211d172f4178602a4f3
SHA256813bc39531cbd5766ecc0edb322fbef276977c20c19aca1c038500ab8c1215d7
SHA5125c199426a01b77088fb874c96d1aec2fbbdefea5a44d94cc115452b8b26e3256bfc14bf37c27189ce8463d3e9fe637efebaaf563cbf26c4760bec66b77af4566