Analysis

  • max time kernel
    306s
  • max time network
    309s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-09-2024 17:11

General

  • Target

    https://bazaar.abuse.ch/sample/bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e/

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bazaar.abuse.ch/sample/bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e/
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e4d0cc40,0x7ff9e4d0cc4c,0x7ff9e4d0cc58
      2⤵
        PID:4628
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1764,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1760 /prefetch:2
        2⤵
          PID:1464
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2104 /prefetch:3
          2⤵
            PID:1708
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2172 /prefetch:8
            2⤵
              PID:232
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3104 /prefetch:1
              2⤵
                PID:4008
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3136 /prefetch:1
                2⤵
                  PID:5000
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3748,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4420 /prefetch:1
                  2⤵
                    PID:4904
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4716,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4724 /prefetch:8
                    2⤵
                      PID:568
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5028,i,8617561624775215098,10397987498032972694,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3172 /prefetch:8
                      2⤵
                      • NTFS ADS
                      PID:4852
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:4280
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:5040
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:2580
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap19390:190:7zEvent31102
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:2828
                        • C:\Users\Admin\Downloads\bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e.exe
                          "C:\Users\Admin\Downloads\bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e.exe"
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2876
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 228
                            2⤵
                            • Program crash
                            PID:4028
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2876 -ip 2876
                          1⤵
                            PID:3248
                          • C:\Users\Admin\Downloads\bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e.exe
                            "C:\Users\Admin\Downloads\bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e.exe"
                            1⤵
                            • Executes dropped EXE
                            PID:2360
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 192
                              2⤵
                              • Program crash
                              PID:1056
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2360 -ip 2360
                            1⤵
                              PID:4364

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              574cb1358e74d051c95ed0b9685db632

                              SHA1

                              e5570bfe36d7a54f2c70dc41b8ba8a00ae504e96

                              SHA256

                              9034e8cea45f3d256d20c737b91912f0884199f2071870646107f841b3244083

                              SHA512

                              3e278ca32c14f0e8df015d3ffab65aef8ed6cafa6d57dad0008c59cadc5121d4c21c75a33c9ace4f6ce49f1b401df4eca67e12547fdeaba507feaa4859b236ed

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                              Filesize

                              213KB

                              MD5

                              f942900ff0a10f251d338c612c456948

                              SHA1

                              4a283d3c8f3dc491e43c430d97c3489ee7a3d320

                              SHA256

                              38b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6

                              SHA512

                              9b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              480B

                              MD5

                              e0fc655d209c4bdbecedea921fb1d4c5

                              SHA1

                              1c210e9bbec9b8cf9a50b5d44864b3764cc278bd

                              SHA256

                              b1c580cc8c1cd75a38707bad795135a587cd6491af6954e90395702265e7ed93

                              SHA512

                              845b10b0683299e80093ba55f76066ffe0407ea48dc70dfe7772e7777237cf903bf5039e91ae2d116ccef88e6cccc1729a2dc266ed211b733bcec6a019c49f3b

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              2KB

                              MD5

                              887a163fa144dc3d56e2112f24248f65

                              SHA1

                              7ba9f1113aac69429bce6d501f49769965a78fa2

                              SHA256

                              bb7cde504e7aebc7b31546fd9047d40189d3214f69b75903415270ca512a473f

                              SHA512

                              56c17b0027de1bb134b1fdac5552ef184c512a5ca81c11a9d82f8f5faf9ba208bed9fbd25f4c6f17f3542b4b36f2d5230414444b5e6f5abfbdfea7900153b385

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              690B

                              MD5

                              c7439e630b337c345b04de83abd52ec5

                              SHA1

                              44c9921d6b5dfd13478ebf3d975cce9b435d3a2d

                              SHA256

                              c6791b8eeb70042a455923452b57ccac051634dfc5fc78524cf9a9c8cef35dd7

                              SHA512

                              763ba16e40982c5c720260ea13cea4d2d74cb33ea0907f478de4e1b8d24cf45fe12c949132cb6e918e152a13319f348c99b4003654cd2bb02f05633a0aa19961

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              690B

                              MD5

                              d780ecfe7847b98c7c3216ccb355f562

                              SHA1

                              111fa41533f006ce0cba6715855d35159cb87960

                              SHA256

                              13d21831c6bf301e6d5ec4d624338aa49cd87b47355a64ac3a680c7a4be13845

                              SHA512

                              58e530af861aba78b111cade712ad000fa34a12b9a3d096ab287e39a9c32ae924503198d174f67e3bbf2ce201cfec8f72dacf24ac610d4006eaadc1513d109c0

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              9KB

                              MD5

                              ccfb8750f38bdbf8011a5ec8a2c775ed

                              SHA1

                              bda4b861adfd6477e27fe00cb9f8b0351f65918a

                              SHA256

                              094bf37d8a283be609626b437e7f074415fbc0ec2e254aa93d7b627a77e70f4e

                              SHA512

                              18d1dee97e35822065058fa4c2e91657a79c1dfdad4e8b4b0fca4069f17a00366832e68567ff1722f1910c5886de3a5ccf59aa000428cb014751f71735dffd7d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              9KB

                              MD5

                              4e8ff176cd09d9789c93d893f63a798b

                              SHA1

                              66b8055a53e5ada8f989ac3e37e80e2df7e16662

                              SHA256

                              28481a296b06b59f8d4493bb2ee50944aa627bfbb63003982c5c20e22e57ffa3

                              SHA512

                              073a78262264ab130dd9252f5572c62466f8d609ca58a5626eafbd858125a0aece9adfa8779235a12b428f2810e166d1d135d12bb6356f31765d0661860a8757

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              101KB

                              MD5

                              1e8e7cf6ef22ce8fdcad2d3e9df08cbc

                              SHA1

                              61fa8830ddf069e6dc28358b0d488cbfd8648317

                              SHA256

                              2eba46aae17e37dcec894d418b100c3ce0df2fe1dd148f4aa7bbe5308692756c

                              SHA512

                              d916fdfcb448c912b5b720f224d0fed9f5a7150f309a9272cb31957797fb1ce4e3e295c2598912f0e3c957f823db953546c58b0bb702f014ea4f1941c2e56c4d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              101KB

                              MD5

                              847c03fd2ab0a0c2ad6869745983f9f0

                              SHA1

                              d988167cfa2bf76e189c9dc2339af939d2084a61

                              SHA256

                              41abffe33bdff73e4cb323b7784b3ba77fa1bdc374bdc052f7aa6b5f672b7d53

                              SHA512

                              49acdd056f2ff73f3dd39a7ba9598fa006d10e3967f6287f8a4ff45239b9951e61912de5abff2b7da6d50518239c90b2a7c237d25d5692dbbe16ec1390c31fc0

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              101KB

                              MD5

                              a2a341fcd2c9831cba703b4bd4e508c4

                              SHA1

                              dd735ec90984abf73126c2268a2ad312ac6ee812

                              SHA256

                              59ea3fb14f480123dcee3107f4d737d339153250094859e972354d2650c7f2a9

                              SHA512

                              3e746642dbde05f3df290650efdef35dbe9dd00c950fa751ddb589b1779f034b15883e782a83d1f73b9659649f600e0323c59877b6df990e0709d48baef580b2

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\Downloads\bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e.exe

                              Filesize

                              128KB

                              MD5

                              fcf03d6280f63f40a60e98d06605ab9d

                              SHA1

                              420755bdc0da94be9a8213df4db439fac11475a8

                              SHA256

                              bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e

                              SHA512

                              82646967165dc19a09440aa76c0eb2b562e336977d75ccf6f9dbf0f7ecc83c34445a21957c6ad8b590aea9252ec60ce74aa676ab94ba09da37ff7b1e7292103b

                            • C:\Users\Admin\Downloads\bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e.zip

                              Filesize

                              58KB

                              MD5

                              aad46aabbd87e06f1cd6740423029d76

                              SHA1

                              4333e4408b125d827831f90b66948982cf1f0b51

                              SHA256

                              0002f383212e1255ab02939b6afc4ffab03215bd45e6b42278add9bf8a8914b5

                              SHA512

                              28d237cf35d894a57bdbd885535b24770db0b883f0f5c62f98c7d44fe9a39ee46a5582807d65736c686b58e5db649a47bc40efb7e5b8acc7c48467bf75a3d122

                            • C:\Users\Admin\Downloads\bf18826310f2337edd96b0d183c47bb82b8f5da9a64ee7dd0a5d077385c8c38e.zip:Zone.Identifier

                              Filesize

                              202B

                              MD5

                              176bd5b62599b7d9ebe877723d7591f6

                              SHA1

                              6f5fc522dd2fee879bfeade1a68e12e2aba76396

                              SHA256

                              ef104f180d69ac49161b7837ec1214a21122ce5ef6fb48955886b63fc627e45f

                              SHA512

                              7ce0d3f438d2bb94c6874e226d70481f0b9a7c2c68b19da096243092aba0012e00ae62af3e164d799cbbba6695a193dbb16546cc9b6bc58ee5d842cc294cd57b