Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
Azorult 3.3.exe
Resource
win7-20241010-en
General
-
Target
Azorult 3.3.exe
-
Size
1.1MB
-
MD5
b91fe4c246efc048b78c9e162754a7a9
-
SHA1
15e1c4fe989290b07b60f93340476a9ba025bfa9
-
SHA256
d6af1ba026c010e4d006842da28b478419bbc4c711f907a28c52079bc7fea1bf
-
SHA512
4538a437fb2241ee38b1ab256618bbf2ea752bab92146fbf9138c6dd9585c5a5291155e19c6004372c925f300c0c7cfa87b7dfc467b556e8dbab092d8d04a2d2
-
SSDEEP
24576:KMyijQZ+ZJLXrfQRTJ6/aIRQbhB0LrKqk:/D0Z+ZZr4RT/I2dB0yqk
Malware Config
Extracted
xworm
146.190.110.91:3389
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/2284-15-0x0000000000A80000-0x0000000000A98000-memory.dmp family_xworm behavioral1/files/0x000800000001932a-14.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1904 powershell.exe 2924 powershell.exe 1436 powershell.exe 1924 powershell.exe 2192 powershell.exe 2824 powershell.exe 2640 powershell.exe 2036 powershell.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk csrss.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.lnk csrss.exe -
Executes dropped EXE 3 IoCs
pid Process 1484 Azorult 3.3.exe 2284 svchost.exe 300 csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Azorult 3.3.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2284 svchost.exe 300 csrss.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2192 powershell.exe 2824 powershell.exe 2640 powershell.exe 2036 powershell.exe 1904 powershell.exe 2924 powershell.exe 1436 powershell.exe 1924 powershell.exe 2284 svchost.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2284 svchost.exe Token: SeDebugPrivilege 300 csrss.exe Token: SeDebugPrivilege 2192 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeDebugPrivilege 1904 powershell.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 2284 svchost.exe Token: SeBackupPrivilege 1748 vssvc.exe Token: SeRestorePrivilege 1748 vssvc.exe Token: SeAuditPrivilege 1748 vssvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2284 svchost.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1484 1528 Azorult 3.3.exe 30 PID 1528 wrote to memory of 1484 1528 Azorult 3.3.exe 30 PID 1528 wrote to memory of 1484 1528 Azorult 3.3.exe 30 PID 1528 wrote to memory of 1484 1528 Azorult 3.3.exe 30 PID 1528 wrote to memory of 2284 1528 Azorult 3.3.exe 31 PID 1528 wrote to memory of 2284 1528 Azorult 3.3.exe 31 PID 1528 wrote to memory of 2284 1528 Azorult 3.3.exe 31 PID 1528 wrote to memory of 300 1528 Azorult 3.3.exe 32 PID 1528 wrote to memory of 300 1528 Azorult 3.3.exe 32 PID 1528 wrote to memory of 300 1528 Azorult 3.3.exe 32 PID 2284 wrote to memory of 2192 2284 svchost.exe 33 PID 2284 wrote to memory of 2192 2284 svchost.exe 33 PID 2284 wrote to memory of 2192 2284 svchost.exe 33 PID 300 wrote to memory of 2824 300 csrss.exe 35 PID 300 wrote to memory of 2824 300 csrss.exe 35 PID 300 wrote to memory of 2824 300 csrss.exe 35 PID 2284 wrote to memory of 2640 2284 svchost.exe 37 PID 2284 wrote to memory of 2640 2284 svchost.exe 37 PID 2284 wrote to memory of 2640 2284 svchost.exe 37 PID 300 wrote to memory of 2036 300 csrss.exe 39 PID 300 wrote to memory of 2036 300 csrss.exe 39 PID 300 wrote to memory of 2036 300 csrss.exe 39 PID 2284 wrote to memory of 1904 2284 svchost.exe 41 PID 2284 wrote to memory of 1904 2284 svchost.exe 41 PID 2284 wrote to memory of 1904 2284 svchost.exe 41 PID 300 wrote to memory of 2924 300 csrss.exe 43 PID 300 wrote to memory of 2924 300 csrss.exe 43 PID 300 wrote to memory of 2924 300 csrss.exe 43 PID 2284 wrote to memory of 1436 2284 svchost.exe 45 PID 2284 wrote to memory of 1436 2284 svchost.exe 45 PID 2284 wrote to memory of 1436 2284 svchost.exe 45 PID 300 wrote to memory of 1924 300 csrss.exe 47 PID 300 wrote to memory of 1924 300 csrss.exe 47 PID 300 wrote to memory of 1924 300 csrss.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"C:\Users\Admin\AppData\Local\Temp\Azorult 3.3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
C:\ProgramData\csrss.exe"C:\ProgramData\csrss.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'csrss.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD50998890ccf8a3d8702db7a84fe6dd7b3
SHA118e561e0ef68fb08d8f391eacd45c7d573206b92
SHA256c33e1408ea96b9ea7a72d44d7742effb4a98776711b7c94c4997a155af61b220
SHA5128132312fb66a9d947eef3f625a4c18b8e640cec51616d0a9fd756e028d1bac5677f5de9a53c3ed32186cb238e8c46613b8c3d6641a6a953d7961412b030c6dd1
-
Filesize
1.3MB
MD58440a861c68965a66c009b140e1bee47
SHA1801a8c77156a2c6cbc5899f36c961dc8fdc56665
SHA256a8add4815bce2e26df3cd492c5686e22ab842bfa52c68af3f33c23adb820d06f
SHA512c42903216f9f35368d41853ae96aaa7a7a07ce0730ca99b26909b98f5525b4fd772e0868c683fae0ca71730c0586ad3130be4ef3e6af68e299a933d9accca266
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5644e515499ec3e4086c9498f0347c785
SHA1797354249e14dd0a7d504cd3fee05d99eacbaaa0
SHA25643550c4d7452f65adad5894136e24ca5ac37af1371afae639e7b085c307fa03e
SHA512a84731ee9da75f58677e21e66090462c3f83efde4087259825f78073d82cc94e8f5ea5de88930481087ced71b1122977c6e734df0690e18a56cf2d84745d2657
-
Filesize
67KB
MD550dce71a753bad01a07904f2af283123
SHA11beab766071ddeff0c8e577c6717debcee0d21e6
SHA2568fb751033d1546ce28f5dcef171857ee879bdd31d76be2ae556f246c258473f3
SHA5127cdc64dcfa8a0cbc1375a1878f560beb083cd9778ff67c5c0f1b693927c35365b384affc9dc33cade4aeaafded11ac328001a18ccb34a559678c1f50fa886c01