Resubmissions
02-03-2020 16:48
200302-yzy1f7p3ns 1012-02-2020 16:43
200212-6g1ertszn6 1015-11-2019 07:22
191115-3jmhn899me 0Analysis
-
max time kernel
116s -
max time network
125s -
platform
windows7_x64 -
resource
win7v191014 -
submitted
12-02-2020 16:43
Static task
static1
Behavioral task
behavioral1
Sample
azorult.exe
Resource
win7v191014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
azorult.exe
Resource
win10v191014
windows10_x64
0 signatures
0 seconds
General
-
Target
azorult.exe
-
Size
828KB
-
MD5
0c77b6f095bbc4d470f79cc7aa9bd864
-
SHA1
20d104338a02d32b08da41290e633f7167807cac
-
SHA256
b219b1a4ce213036313ffc366e1bcfda433bf68b996c250819181b08701494bd
-
SHA512
6e14d83ba5bc70317d69305d051be70a63fcef642c049bc1787247c9a4afc418217ab316698fc3387b46df3fb1fab157a64583bca3dba09b8dd3cbbc9d177340
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://waresystem.com/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
azorult.exedescription pid process target process PID 1316 set thread context of 1084 1316 azorult.exe azorult.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
azorult.exepid process 1316 azorult.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
azorult.exepid process 1316 azorult.exe 1316 azorult.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
azorult.exedescription pid process target process PID 1316 wrote to memory of 1084 1316 azorult.exe azorult.exe PID 1316 wrote to memory of 1084 1316 azorult.exe azorult.exe PID 1316 wrote to memory of 1084 1316 azorult.exe azorult.exe PID 1316 wrote to memory of 1084 1316 azorult.exe azorult.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\azorult.exe"C:\Users\Admin\AppData\Local\Temp\azorult.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\azorult.exe"C:\Users\Admin\AppData\Local\Temp\azorult.exe"2⤵