Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
ZiraatTRK6575740.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZiraatTRK6575740.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/cse4roo.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/cse4roo.dll
Resource
win10v2004-20241007-en
General
-
Target
ZiraatTRK6575740.exe
-
Size
345KB
-
MD5
710472a8addb7f60ad0cf827edc0f51a
-
SHA1
6f0a0dd32734de4b5529c87d5b73001bb8a2b37f
-
SHA256
07901d29fd52f346dfc7af58c41499260674510d887bedb11e9a5c9a87967c85
-
SHA512
42b295bb466ac87d441aa7bbbe22ce49e66079dbf28e58eb9ce8fdec82a716afb719ea2c94b68edc6e891a67937a52a561a232edb093687ca0dfec77d83cc1ee
-
SSDEEP
6144:8DIXx1xeTIIIIIIIIIIISIIIIIIIIIIlIIIasooo7ObIIGII4Ijie2QPw2qrEY33:dVeTIIIIIIIIIIISIIIIIIIIIIlIIIlB
Malware Config
Extracted
azorult
http://bengalcement.com.bd/AxPu/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Loads dropped DLL 1 IoCs
pid Process 540 ZiraatTRK6575740.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 540 set thread context of 444 540 ZiraatTRK6575740.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2924 444 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZiraatTRK6575740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 540 ZiraatTRK6575740.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 444 540 ZiraatTRK6575740.exe 83 PID 540 wrote to memory of 444 540 ZiraatTRK6575740.exe 83 PID 540 wrote to memory of 444 540 ZiraatTRK6575740.exe 83 PID 540 wrote to memory of 444 540 ZiraatTRK6575740.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZiraatTRK6575740.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatTRK6575740.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\ZiraatTRK6575740.exe"2⤵
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 12763⤵
- Program crash
PID:2924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 444 -ip 4441⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD555ece16004aa5f4e2922619cd4550be1
SHA1314c0edc2a812e88da96322d340919f63a392d8d
SHA2563ce9036a2569c7c3c15061528ecf49747620d4fd3b22338694c9525c6c0e4fc3
SHA51225cba598082fc6d7705a0c0e7de491fe156fce88308fe510d70d40c01bf458849cf9f50f190ad67ca742b2829357170978accae1d3eeb9190850d3dc4746aa24