Analysis

  • max time kernel
    19s
  • max time network
    106s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-01-2021 18:03

General

  • Target

    bd77c6cc5e497fdcbb12fa2efa06abd2f39b58487cbe72f2191bb9e4c4640c31.exe

  • Size

    833KB

  • MD5

    9b0cba63f37783d933cd86fc96f2aa07

  • SHA1

    b5a93abac6411cc261b9f3d484fec192e136338c

  • SHA256

    bd77c6cc5e497fdcbb12fa2efa06abd2f39b58487cbe72f2191bb9e4c4640c31

  • SHA512

    473926d8f8d6e8127fca322a850ae988fd9bf286719d17936b7bd52b221c4d8e6eb4c15b785a2bc0b1d39bb2c24cac7901e65503b94d7e0d3e710fbe7cce9be1

Malware Config

Extracted

Family

azorult

C2

http://main.kebleflooring.co.uk/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd77c6cc5e497fdcbb12fa2efa06abd2f39b58487cbe72f2191bb9e4c4640c31.exe
    "C:\Users\Admin\AppData\Local\Temp\bd77c6cc5e497fdcbb12fa2efa06abd2f39b58487cbe72f2191bb9e4c4640c31.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Users\Admin\AppData\Local\backup.exe
      C:\Users\Admin\AppData\Local\backup.exe
      2⤵
      • Executes dropped EXE
      PID:2868
    • C:\Users\Admin\AppData\Local\rar_temp1.exe
      C:\Users\Admin\AppData\Local\rar_temp1.exe
      2⤵
      • Executes dropped EXE
      PID:476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\backup.exe
    MD5

    49fad1b9e61959fad1566eeaac72eb33

    SHA1

    f5d128c09a53bf4ce97789e67bf8197d6d44f118

    SHA256

    87f4e1cbc145e642d7c69f6935ef9be74475e76827de585561218f96350e6fed

    SHA512

    2fcb2c34e5e5c60060cec00a3396500f2e0df9cd871cc36474f2e1c8b9e6e6dce066077b3ec1e11e2b409c4f2247588fcb5099c4369fcd84d5d232ac795ffdeb

  • C:\Users\Admin\AppData\Local\backup.exe
    MD5

    49fad1b9e61959fad1566eeaac72eb33

    SHA1

    f5d128c09a53bf4ce97789e67bf8197d6d44f118

    SHA256

    87f4e1cbc145e642d7c69f6935ef9be74475e76827de585561218f96350e6fed

    SHA512

    2fcb2c34e5e5c60060cec00a3396500f2e0df9cd871cc36474f2e1c8b9e6e6dce066077b3ec1e11e2b409c4f2247588fcb5099c4369fcd84d5d232ac795ffdeb

  • C:\Users\Admin\AppData\Local\rar_temp1.exe
    MD5

    2aec40fc2e52200343e4f67f654c67ed

    SHA1

    bc9897911617a27c9a5c150a8448cfad02017cf3

    SHA256

    224a640ec25e14f8cf70b3e1a28b8e9039835d1caaf824df9935d96f0eca4cd7

    SHA512

    ae166620dd905eb5b4dfd4dd6b4f1cb385f5e7a5e736b8cc9e94aa89e2d594462b4e139fa723cdc4c56675cfbe1c548cc6a156363e13550ab0e598ad158bfb07

  • C:\Users\Admin\AppData\Local\rar_temp1.exe
    MD5

    2aec40fc2e52200343e4f67f654c67ed

    SHA1

    bc9897911617a27c9a5c150a8448cfad02017cf3

    SHA256

    224a640ec25e14f8cf70b3e1a28b8e9039835d1caaf824df9935d96f0eca4cd7

    SHA512

    ae166620dd905eb5b4dfd4dd6b4f1cb385f5e7a5e736b8cc9e94aa89e2d594462b4e139fa723cdc4c56675cfbe1c548cc6a156363e13550ab0e598ad158bfb07

  • memory/476-5-0x0000000000000000-mapping.dmp
  • memory/2868-2-0x0000000000000000-mapping.dmp