Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-09-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
Azorult 3.3.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Azorult 3.3.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
Azorult 3.3.exe
Resource
win10v2004-20240802-en
General
-
Target
Azorult 3.3.exe
-
Size
1.1MB
-
MD5
b91fe4c246efc048b78c9e162754a7a9
-
SHA1
15e1c4fe989290b07b60f93340476a9ba025bfa9
-
SHA256
d6af1ba026c010e4d006842da28b478419bbc4c711f907a28c52079bc7fea1bf
-
SHA512
4538a437fb2241ee38b1ab256618bbf2ea752bab92146fbf9138c6dd9585c5a5291155e19c6004372c925f300c0c7cfa87b7dfc467b556e8dbab092d8d04a2d2
-
SSDEEP
24576:KMyijQZ+ZJLXrfQRTJ6/aIRQbhB0LrKqk:/D0Z+ZZr4RT/I2dB0yqk
Malware Config
Extracted
xworm
146.190.110.91:3389
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral4/files/0x000600000002aa00-18.dat family_xworm behavioral4/memory/1048-41-0x0000000000980000-0x0000000000998000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4756 powershell.exe 800 powershell.exe 4364 powershell.exe 5088 powershell.exe 1468 powershell.exe 4888 powershell.exe 916 powershell.exe 1408 powershell.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk csrss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk csrss.exe -
Executes dropped EXE 3 IoCs
pid Process 4824 Azorult 3.3.exe 1048 svchost.exe 4976 csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Azorult 3.3.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1048 svchost.exe 4976 csrss.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1468 powershell.exe 4888 powershell.exe 1468 powershell.exe 4888 powershell.exe 1408 powershell.exe 916 powershell.exe 916 powershell.exe 1408 powershell.exe 4756 powershell.exe 4756 powershell.exe 800 powershell.exe 800 powershell.exe 4364 powershell.exe 5088 powershell.exe 4364 powershell.exe 5088 powershell.exe 1048 svchost.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1048 svchost.exe Token: SeDebugPrivilege 4976 csrss.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeDebugPrivilege 4888 powershell.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeDebugPrivilege 1408 powershell.exe Token: SeDebugPrivilege 4756 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeDebugPrivilege 4364 powershell.exe Token: SeDebugPrivilege 5088 powershell.exe Token: SeDebugPrivilege 1048 svchost.exe Token: SeBackupPrivilege 1540 vssvc.exe Token: SeRestorePrivilege 1540 vssvc.exe Token: SeAuditPrivilege 1540 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1048 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4824 2484 Azorult 3.3.exe 82 PID 2484 wrote to memory of 4824 2484 Azorult 3.3.exe 82 PID 2484 wrote to memory of 4824 2484 Azorult 3.3.exe 82 PID 2484 wrote to memory of 1048 2484 Azorult 3.3.exe 83 PID 2484 wrote to memory of 1048 2484 Azorult 3.3.exe 83 PID 2484 wrote to memory of 4976 2484 Azorult 3.3.exe 84 PID 2484 wrote to memory of 4976 2484 Azorult 3.3.exe 84 PID 1048 wrote to memory of 1468 1048 svchost.exe 85 PID 1048 wrote to memory of 1468 1048 svchost.exe 85 PID 4976 wrote to memory of 4888 4976 csrss.exe 87 PID 4976 wrote to memory of 4888 4976 csrss.exe 87 PID 1048 wrote to memory of 916 1048 svchost.exe 89 PID 1048 wrote to memory of 916 1048 svchost.exe 89 PID 4976 wrote to memory of 1408 4976 csrss.exe 91 PID 4976 wrote to memory of 1408 4976 csrss.exe 91 PID 4976 wrote to memory of 4756 4976 csrss.exe 93 PID 4976 wrote to memory of 4756 4976 csrss.exe 93 PID 1048 wrote to memory of 800 1048 svchost.exe 95 PID 1048 wrote to memory of 800 1048 svchost.exe 95 PID 4976 wrote to memory of 4364 4976 csrss.exe 97 PID 4976 wrote to memory of 4364 4976 csrss.exe 97 PID 1048 wrote to memory of 5088 1048 svchost.exe 99 PID 1048 wrote to memory of 5088 1048 svchost.exe 99 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\ProgramData\csrss.exe"C:\ProgramData\csrss.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD50998890ccf8a3d8702db7a84fe6dd7b3
SHA118e561e0ef68fb08d8f391eacd45c7d573206b92
SHA256c33e1408ea96b9ea7a72d44d7742effb4a98776711b7c94c4997a155af61b220
SHA5128132312fb66a9d947eef3f625a4c18b8e640cec51616d0a9fd756e028d1bac5677f5de9a53c3ed32186cb238e8c46613b8c3d6641a6a953d7961412b030c6dd1
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD5a13d86aa4aa93ee4e7b6a655edf6cc79
SHA1b3172c58361cfc52fe51b7bd2971df38657e77db
SHA256d42c42ef46ed4341b7eb52572aa6c7bc7720401481c93b38d6cc7cbf00826066
SHA5126e55311ca9f9ec756eac30841c9564a679089b7a249a6d5841e97e7bc73e5dd213bd7683856b740bbae2fa46456558558f52ec78b4460ef932d363d3e7800fbf
-
Filesize
944B
MD534e3230cb2131270db1af79fb3d57752
SHA121434dd7cf3c4624226b89f404fd7982825f8ac6
SHA2560f162f27548a84db1638bcf46d03661b5bcb3032e765fafdb597cc107639ba39
SHA5123756cb01e82dbda681b562eae74d0b8ef8b3787b126119a51a92c51a78204a7805b9bdd60c00c50a3be23b843e78bb153b656540767069f739ce421b9bc02335
-
Filesize
944B
MD5e3840d9bcedfe7017e49ee5d05bd1c46
SHA1272620fb2605bd196df471d62db4b2d280a363c6
SHA2563ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f
SHA51276adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376
-
Filesize
944B
MD50bdf1f3b17535062ac08020252a67de7
SHA10bdfb9e03a0495d3348c44050fe2c2ad5b8ded5c
SHA256868024d64b75b07c6848c7297ca32670af1ff5a4f961baaf873daddf3a8abbae
SHA512ec18062b156907365e198d99038b1616b28055b0f9fe1714489ff2bd5f2a5bd0affb7ac954763b1cf197d038d000566ba05fc6fb27da401e24ad9ac284ab6ba7
-
Filesize
1.3MB
MD58440a861c68965a66c009b140e1bee47
SHA1801a8c77156a2c6cbc5899f36c961dc8fdc56665
SHA256a8add4815bce2e26df3cd492c5686e22ab842bfa52c68af3f33c23adb820d06f
SHA512c42903216f9f35368d41853ae96aaa7a7a07ce0730ca99b26909b98f5525b4fd772e0868c683fae0ca71730c0586ad3130be4ef3e6af68e299a933d9accca266
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
67KB
MD550dce71a753bad01a07904f2af283123
SHA11beab766071ddeff0c8e577c6717debcee0d21e6
SHA2568fb751033d1546ce28f5dcef171857ee879bdd31d76be2ae556f246c258473f3
SHA5127cdc64dcfa8a0cbc1375a1878f560beb083cd9778ff67c5c0f1b693927c35365b384affc9dc33cade4aeaafded11ac328001a18ccb34a559678c1f50fa886c01