Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
09-07-2020 14:52
Static task
static1
Behavioral task
behavioral1
Sample
c6a8daa2678db7fe81d4c0db28ad30d5.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c6a8daa2678db7fe81d4c0db28ad30d5.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
c6a8daa2678db7fe81d4c0db28ad30d5.exe
-
Size
830KB
-
MD5
c6a8daa2678db7fe81d4c0db28ad30d5
-
SHA1
81513df77a323812dfa35446711ab3507fda7b7d
-
SHA256
7f6bc984038905de70fa3580480df8297dbaf3eabb971fa949550a99641e56cb
-
SHA512
341ba0be30fa02ac87f6e8b26b9a4bc92cc70d26cde019580a3f55ab7a7bc2c2b108da7a2d5277d52d8ed6f2acecd9a8581ed51821b24f9886808db994f34576
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://165.22.238.167/index.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c6a8daa2678db7fe81d4c0db28ad30d5.exedescription pid process target process PID 1508 set thread context of 1824 1508 c6a8daa2678db7fe81d4c0db28ad30d5.exe c6a8daa2678db7fe81d4c0db28ad30d5.exe -
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c6a8daa2678db7fe81d4c0db28ad30d5.exepid process 1508 c6a8daa2678db7fe81d4c0db28ad30d5.exe 1508 c6a8daa2678db7fe81d4c0db28ad30d5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c6a8daa2678db7fe81d4c0db28ad30d5.exedescription pid process target process PID 1508 wrote to memory of 1824 1508 c6a8daa2678db7fe81d4c0db28ad30d5.exe c6a8daa2678db7fe81d4c0db28ad30d5.exe PID 1508 wrote to memory of 1824 1508 c6a8daa2678db7fe81d4c0db28ad30d5.exe c6a8daa2678db7fe81d4c0db28ad30d5.exe PID 1508 wrote to memory of 1824 1508 c6a8daa2678db7fe81d4c0db28ad30d5.exe c6a8daa2678db7fe81d4c0db28ad30d5.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c6a8daa2678db7fe81d4c0db28ad30d5.exepid process 1508 c6a8daa2678db7fe81d4c0db28ad30d5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6a8daa2678db7fe81d4c0db28ad30d5.exe"C:\Users\Admin\AppData\Local\Temp\c6a8daa2678db7fe81d4c0db28ad30d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\c6a8daa2678db7fe81d4c0db28ad30d5.exe"C:\Users\Admin\AppData\Local\Temp\c6a8daa2678db7fe81d4c0db28ad30d5.exe"2⤵PID:1824