download:

qwerty.ps1

Full analysis: https://app.any.run/tasks/39d9bbc2-d540-4bf6-a526-f0ab5a0b2590
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: February 18, 2019, 19:59:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
azorult
ransomware
gandcrab
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines
MD5:

2A38A8189A48B26EE932B937A8AFE529

SHA1:

08331A029132D44BAD08345751DEFA276B674520

SHA256:

44210681FA26A0DB1BC0E5FBCCBAA979B2A03C5AC6C4919D8E2EBD34486DFDCE

SSDEEP:

12288:/+4cJ4QK3tJMCiY7XKD+NZQkhuMW4mPpXx+dtxc:9cJ47tpdu+sH1A/xc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • ajxn.exe (PID: 2476)
      • ajxn.exe (PID: 1380)
      • ajxn.exe (PID: 3016)
    • Actions looks like stealing of personal data

      • ajxn.exe (PID: 3016)
      • ajxn.exe (PID: 1380)
    • Connects to CnC server

      • ajxn.exe (PID: 3016)
      • ajxn.exe (PID: 1380)
    • AZORULT was detected

      • ajxn.exe (PID: 3016)
    • Loads dropped or rewritten executable

      • ajxn.exe (PID: 3016)
    • GandCrab keys found

      • ajxn.exe (PID: 1380)
    • Writes file to Word startup folder

      • ajxn.exe (PID: 1380)
    • Renames files like Ransomware

      • ajxn.exe (PID: 1380)
    • Dropped file may contain instructions of ransomware

      • ajxn.exe (PID: 1380)
    • Deletes shadow copies

      • ajxn.exe (PID: 1380)
    • Changes settings of System certificates

      • ajxn.exe (PID: 1380)
  • SUSPICIOUS

    • Application launched itself

      • ajxn.exe (PID: 2476)
    • Creates files in the user directory

      • ajxn.exe (PID: 3016)
      • powershell.exe (PID: 2852)
      • ajxn.exe (PID: 1380)
    • Reads the cookies of Google Chrome

      • ajxn.exe (PID: 3016)
    • Reads the cookies of Mozilla Firefox

      • ajxn.exe (PID: 3016)
      • ajxn.exe (PID: 1380)
    • Creates files in the program directory

      • ajxn.exe (PID: 1380)
    • Executable content was dropped or overwritten

      • ajxn.exe (PID: 3016)
      • powershell.exe (PID: 2852)
    • Creates files like Ransomware instruction

      • ajxn.exe (PID: 1380)
    • Reads Internet Cache Settings

      • ajxn.exe (PID: 1380)
    • Adds / modifies Windows certificates

      • ajxn.exe (PID: 1380)
  • INFO

    • Dropped object may contain TOR URL's

      • ajxn.exe (PID: 1380)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start powershell.exe ajxn.exe no specs #AZORULT ajxn.exe #GANDCRAB ajxn.exe wmic.exe vssvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
884"C:\Windows\system32\wbem\wmic.exe" shadowcopy deleteC:\Windows\system32\wbem\wmic.exe
ajxn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1380C:\Users\Public\ajxn.exe"C:\Users\Public\ajxn.exe
ajxn.exe
User:
admin
Integrity Level:
MEDIUM
Description:
chiromancy
Exit code:
0
Version:
1.09.0001
Modules
Images
c:\users\public\ajxn.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
2476"C:\Users\Public\ajxn.exe"C:\Users\Public\ajxn.exepowershell.exe
User:
admin
Integrity Level:
MEDIUM
Description:
chiromancy
Exit code:
0
Version:
1.09.0001
Modules
Images
c:\users\public\ajxn.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2852"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\qwerty.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\atl.dll
2932C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3016C:\Users\Public\ajxn.exe"C:\Users\Public\ajxn.exe
ajxn.exe
User:
admin
Integrity Level:
MEDIUM
Description:
chiromancy
Exit code:
0
Version:
1.09.0001
Modules
Images
c:\users\public\ajxn.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
409
Read events
310
Write events
99
Delete events
0

Modification events

(PID) Process:(2852) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2852) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2852) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3016) ajxn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ajxn_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3016) ajxn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ajxn_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3016) ajxn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ajxn_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3016) ajxn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ajxn_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3016) ajxn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ajxn_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3016) ajxn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ajxn_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3016) ajxn.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ajxn_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
Executable files
49
Suspicious files
428
Text files
318
Unknown types
13

Dropped files

PID
Process
Filename
Type
2852powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3FV7D4V0ZM7VCWAM0ENP.temp
MD5:
SHA256:
2852powershell.exeC:\Users\Public\ajxn.exeexecutable
MD5:
SHA256:
2852powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:
SHA256:
2476ajxn.exeC:\Users\admin\AppData\Local\Temp\~DF068A8C1CF5B7DBA1.TMPbinary
MD5:
SHA256:
2852powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF198756.TMPbinary
MD5:
SHA256:
3016ajxn.exeC:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CB978304B79EF53962408C611DFB20F5
SHA256:90FAE0E7C3644A6754833C42B0AC39B6F23859F9A7CF4B6C8624820F59B9DAD3
3016ajxn.exeC:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:88FF191FD8648099592ED28EE6C442A5
SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
3016ajxn.exeC:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:94AE25C7A5497CA0BE6882A00644CA64
SHA256:7EA06B7050F9EA2BCC12AF34374BDF1173646D4E5EBF66AD690B37F4DF5F3D4E
3016ajxn.exeC:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:6D778E83F74A4C7FE4C077DC279F6867
SHA256:A97DCCA76CDB12E985DFF71040815F28508C655AB2B073512E386DD63F4DA325
3016ajxn.exeC:\Users\admin\AppData\Local\Temp\9622D276\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:E479444BDD4AE4577FD32314A68F5D28
SHA256:C85DC081B1964B77D289AAC43CC64746E7B141D036F248A731601EB98F827719
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
4
DNS requests
2
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3016
ajxn.exe
POST
188.225.58.33:80
http://dsdfgdfsdegdf.ru/index.php
RU
malicious
1380
ajxn.exe
GET
301
185.52.2.154:80
http://www.kakaocorp.link/
NL
html
162 b
malicious
3016
ajxn.exe
POST
200
188.225.58.33:80
http://dsdfgdfsdegdf.ru/index.php
RU
binary
4.27 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1380
ajxn.exe
185.52.2.154:443
www.kakaocorp.link
RouteLabel V.O.F.
NL
suspicious
1380
ajxn.exe
185.52.2.154:80
www.kakaocorp.link
RouteLabel V.O.F.
NL
suspicious
3016
ajxn.exe
188.225.58.33:80
dsdfgdfsdegdf.ru
TimeWeb Ltd.
RU
suspicious

DNS requests

Domain
IP
Reputation
dsdfgdfsdegdf.ru
  • 188.225.58.33
  • 77.221.146.5
  • 185.62.103.173
malicious
www.kakaocorp.link
  • 185.52.2.154
malicious

Threats

PID
Process
Class
Message
3016
ajxn.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult HTTP Header
3016
ajxn.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Request
3016
ajxn.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Response
3016
ajxn.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult HTTP Header
3016
ajxn.exe
A Network Trojan was detected
ET TROJAN Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)
1380
ajxn.exe
A Network Trojan was detected
MALWARE [PTsecurity] Blacklisted GandCrab Ransomware C2 Server
1380
ajxn.exe
A Network Trojan was detected
MALWARE [PTsecurity] Blacklisted GandCrab Ransomware C2 Server
1380
ajxn.exe
A Network Trojan was detected
MALWARE [PTsecurity] GandCrab v.5 SSL Connection
3 ETPRO signatures available at the full report
No debug info