Analysis
-
max time kernel
143s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:21
Static task
static1
Behavioral task
behavioral1
Sample
REQUEST FOR QUOTATION.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
REQUEST FOR QUOTATION.exe
Resource
win10v2004-20240802-en
General
-
Target
REQUEST FOR QUOTATION.exe
-
Size
1.2MB
-
MD5
e9ca252dd177f5c06f0ce11a0fc51831
-
SHA1
e7c8015ffae2632f603281f3a2fa4ddd056e953d
-
SHA256
cadf473faf1d13c235bcb7a919e268de63acc0394d74b6ee10d9c80c59dbbb2d
-
SHA512
eff64199b2bf9c0b9604cc9b044f42b79ff5ac3506f4208bb476655f0bc4d68aadbd99e979d4d2751fb40eb32861b89233045b3a9f0c0feeede0aef697f17ac4
-
SSDEEP
24576:dpqP+28AXUldkBbHGM5dzEos0NxHmrs1Bg:/NpNldkBbHlsosOxHQ
Malware Config
Extracted
azorult
http://18.197.52.125/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2488 set thread context of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2892 set thread context of 1332 2892 REQUEST FOR QUOTATION.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REQUEST FOR QUOTATION.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REQUEST FOR QUOTATION.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REQUEST FOR QUOTATION.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1740 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe 2892 REQUEST FOR QUOTATION.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2892 REQUEST FOR QUOTATION.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2140 2488 REQUEST FOR QUOTATION.exe 31 PID 2488 wrote to memory of 2140 2488 REQUEST FOR QUOTATION.exe 31 PID 2488 wrote to memory of 2140 2488 REQUEST FOR QUOTATION.exe 31 PID 2488 wrote to memory of 2140 2488 REQUEST FOR QUOTATION.exe 31 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2488 wrote to memory of 2892 2488 REQUEST FOR QUOTATION.exe 33 PID 2892 wrote to memory of 1348 2892 REQUEST FOR QUOTATION.exe 34 PID 2892 wrote to memory of 1348 2892 REQUEST FOR QUOTATION.exe 34 PID 2892 wrote to memory of 1348 2892 REQUEST FOR QUOTATION.exe 34 PID 2892 wrote to memory of 1348 2892 REQUEST FOR QUOTATION.exe 34 PID 1348 wrote to memory of 1740 1348 cmd.exe 36 PID 1348 wrote to memory of 1740 1348 cmd.exe 36 PID 1348 wrote to memory of 1740 1348 cmd.exe 36 PID 1348 wrote to memory of 1740 1348 cmd.exe 36 PID 2892 wrote to memory of 1144 2892 REQUEST FOR QUOTATION.exe 37 PID 2892 wrote to memory of 1144 2892 REQUEST FOR QUOTATION.exe 37 PID 2892 wrote to memory of 1144 2892 REQUEST FOR QUOTATION.exe 37 PID 2892 wrote to memory of 1144 2892 REQUEST FOR QUOTATION.exe 37 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38 PID 2892 wrote to memory of 1332 2892 REQUEST FOR QUOTATION.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YfucvuW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp57B1.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"3⤵PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"C:\Users\Admin\AppData\Local\Temp\REQUEST FOR QUOTATION.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d766c49edf2bb8362b26d4e606e11ce3
SHA160ac93aeaa7c5db7cb1aee89abece9d8489d3646
SHA256d113c9a180d4da2ebadbdbe02a64c18ff5b36f17d1dbaee449779359d32d2736
SHA512a24e50b0f27bb3a5af1d62ff0ef9fdc7b11e2eccaa95ee6b9079c2c0531ce448b609e76b3f3769aeef3a0514be6fd9c61982d5fd6ff4ecd12531afcc8a50ebbf