Overview
overview
10Static
static
10keygen-step-1.exe
windows7-x64
10keygen-step-1.exe
windows10-2004-x64
10keygen-step-3.exe
windows7-x64
7keygen-step-3.exe
windows10-2004-x64
7keygen-ste...ck.exe
windows7-x64
3keygen-ste...ck.exe
windows10-2004-x64
7keygen-ste...28.exe
windows7-x64
10keygen-ste...28.exe
windows10-2004-x64
10keygen-ste...up.exe
windows7-x64
6keygen-ste...up.exe
windows10-2004-x64
6keygen-ste...5f.exe
windows7-x64
10keygen-ste...5f.exe
windows10-2004-x64
10keygen-ste...af.exe
windows7-x64
10keygen-ste...af.exe
windows10-2004-x64
10keygen-step-4/ss.exe
windows7-x64
1keygen-step-4/ss.exe
windows10-2004-x64
1keygen-step-6.exe
windows7-x64
7keygen-step-6.exe
windows10-2004-x64
7keygen.bat
windows7-x64
10keygen.bat
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 13:01
Behavioral task
behavioral1
Sample
keygen-step-1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
keygen-step-1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
keygen-step-3.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
keygen-step-3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
keygen-step-4/Crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
keygen-step-4/Crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
keygen-step-4/PBrowFile28.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
keygen-step-4/PBrowFile28.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
keygen-step-4/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
keygen-step-4/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
keygen-step-4/f2217e5f.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
keygen-step-4/f2217e5f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
keygen-step-4/md1_1eaf.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
keygen-step-4/md1_1eaf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
keygen-step-4/ss.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
keygen-step-4/ss.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
keygen-step-6.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
keygen-step-6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
keygen.bat
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
keygen.bat
Resource
win10v2004-20241007-en
General
-
Target
keygen.bat
-
Size
149B
-
MD5
0b2622826dd00820d5725440efd7d5f4
-
SHA1
0a9f8675e9b39a984267d402449a7f2291edfb17
-
SHA256
82723c93594b47e60cc855d7d113a09763bb4636330ff44bbbb949eb0fdcf54f
-
SHA512
9f2ffa1065e7eeeda6a139ba1d85465cbb56a9be1419c90e599e604fc718244fc8b77b2bc46bbf3abba36e985b543c72d1e154e2d2d615c8519a9379e94804f3
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Executes dropped EXE 1 IoCs
Processes:
winnetdriv.exepid process 2084 winnetdriv.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ip-api.com -
Drops file in Windows directory 2 IoCs
Processes:
keygen-step-3.exedescription ioc process File created C:\Windows\winnetdriv.exe keygen-step-3.exe File opened for modification C:\Windows\winnetdriv.exe keygen-step-3.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
keygen-step-6.exewinnetdriv.execmd.exePING.EXEkeygen-step-1.exekeygen-step-3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winnetdriv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen-step-3.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2564 cmd.exe 2672 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
Processes:
keygen-step-1.exekeygen-step-6.exekeygen-step-3.exepid process 3048 keygen-step-1.exe 2352 keygen-step-6.exe 3052 keygen-step-3.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
cmd.exekeygen-step-3.exekeygen-step-6.execmd.exedescription pid process target process PID 2316 wrote to memory of 3048 2316 cmd.exe keygen-step-1.exe PID 2316 wrote to memory of 3048 2316 cmd.exe keygen-step-1.exe PID 2316 wrote to memory of 3048 2316 cmd.exe keygen-step-1.exe PID 2316 wrote to memory of 3048 2316 cmd.exe keygen-step-1.exe PID 2316 wrote to memory of 2352 2316 cmd.exe keygen-step-6.exe PID 2316 wrote to memory of 2352 2316 cmd.exe keygen-step-6.exe PID 2316 wrote to memory of 2352 2316 cmd.exe keygen-step-6.exe PID 2316 wrote to memory of 2352 2316 cmd.exe keygen-step-6.exe PID 2316 wrote to memory of 3052 2316 cmd.exe keygen-step-3.exe PID 2316 wrote to memory of 3052 2316 cmd.exe keygen-step-3.exe PID 2316 wrote to memory of 3052 2316 cmd.exe keygen-step-3.exe PID 2316 wrote to memory of 3052 2316 cmd.exe keygen-step-3.exe PID 3052 wrote to memory of 2084 3052 keygen-step-3.exe winnetdriv.exe PID 3052 wrote to memory of 2084 3052 keygen-step-3.exe winnetdriv.exe PID 3052 wrote to memory of 2084 3052 keygen-step-3.exe winnetdriv.exe PID 3052 wrote to memory of 2084 3052 keygen-step-3.exe winnetdriv.exe PID 2352 wrote to memory of 2564 2352 keygen-step-6.exe cmd.exe PID 2352 wrote to memory of 2564 2352 keygen-step-6.exe cmd.exe PID 2352 wrote to memory of 2564 2352 keygen-step-6.exe cmd.exe PID 2352 wrote to memory of 2564 2352 keygen-step-6.exe cmd.exe PID 2564 wrote to memory of 2672 2564 cmd.exe PING.EXE PID 2564 wrote to memory of 2672 2564 cmd.exe PING.EXE PID 2564 wrote to memory of 2672 2564 cmd.exe PING.EXE PID 2564 wrote to memory of 2672 2564 cmd.exe PING.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\keygen.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\keygen-step-1.exekeygen-step-1.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-6.exekeygen-step-6.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\keygen-step-6.exe" >> NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-3.exekeygen-step-3.exe2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\winnetdriv.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-3.exe" 1731243708 03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
873KB
MD5265cadde82b0c66dc39ad2d9ee800754
SHA12e9604eade6951d5a5b4a44bee1281e32166f395
SHA25640fd6a0b671a0e5074a206201f57f7731a0d01baab5874b28a9b0f019a451c5a
SHA512c99f3a5464e1ac02402814401c2cb66a9fafb794356395c1081bdf3c4c3534086498c19efe4055780a52a1bb80db81658c2cb4af5271015af51edf7bd3865e7b