Analysis

  • max time kernel
    43s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-01-2021 12:13

General

  • Target

    bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe

  • Size

    831KB

  • MD5

    a2585ea964bff6f97eb64ecd6db479c1

  • SHA1

    59b07fb7cf8fc6691c7427248218037d8bff7e7e

  • SHA256

    bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352

  • SHA512

    b9ce31b81d6f9e44cdc25d367fa9584f2ba5235a3964370123322375425b4a22bc52331404f4d6bcf31641ae4ee6c50c21f15b2ffa4ee81532bba14d8c2fead3

Malware Config

Extracted

Family

azorult

C2

http://66.228.39.174/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe
    "C:\Users\Admin\AppData\Local\Temp\bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe
      "{path}"
      2⤵
        PID:1612

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/916-8-0x000007FEF7790000-0x000007FEF7A0A000-memory.dmp
      Filesize

      2.5MB

    • memory/1204-2-0x00000000765E1000-0x00000000765E3000-memory.dmp
      Filesize

      8KB

    • memory/1204-3-0x0000000000910000-0x0000000000911000-memory.dmp
      Filesize

      4KB

    • memory/1204-4-0x0000000000911000-0x0000000000912000-memory.dmp
      Filesize

      4KB

    • memory/1612-5-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/1612-6-0x000000000041A1F8-mapping.dmp
    • memory/1612-9-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB