Analysis

  • max time kernel
    41s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-11-2020 16:12

General

  • Target

    8d58498de34e8674d319dc578b7b5f87.exe

  • Size

    112KB

  • MD5

    8d58498de34e8674d319dc578b7b5f87

  • SHA1

    d70595f68878b2bd1a308015e1963186ca73cce8

  • SHA256

    09758dfa192e1932726afa788ef5272c035f6e95e398b20db04a68fd698e3258

  • SHA512

    ebd012b23e57ee1617aa7e15ea101c43a87b18e8108cb9c01f7096fa03829728f51effc3324499dc48964fce4f65f8b280b08896750f049e0f86462c3ef8cb6b

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d58498de34e8674d319dc578b7b5f87.exe
    "C:\Users\Admin\AppData\Local\Temp\8d58498de34e8674d319dc578b7b5f87.exe"
    1⤵
    • Modifies system certificate store
    PID:1032

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-0-0x000007FEF71F0000-0x000007FEF746A000-memory.dmp
    Filesize

    2.5MB