Analysis

  • max time kernel
    47s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-01-2021 12:13

General

  • Target

    bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe

  • Size

    831KB

  • MD5

    a2585ea964bff6f97eb64ecd6db479c1

  • SHA1

    59b07fb7cf8fc6691c7427248218037d8bff7e7e

  • SHA256

    bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352

  • SHA512

    b9ce31b81d6f9e44cdc25d367fa9584f2ba5235a3964370123322375425b4a22bc52331404f4d6bcf31641ae4ee6c50c21f15b2ffa4ee81532bba14d8c2fead3

Malware Config

Extracted

Family

azorult

C2

http://66.228.39.174/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe
    "C:\Users\Admin\AppData\Local\Temp\bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:732
    • C:\Users\Admin\AppData\Local\Temp\bea960ae51836b4d2233c5df014fd0c7fa70bd99456fe247d7c8b4efec36b352.exe
      "{path}"
      2⤵
        PID:644

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/644-4-0x000000000041A1F8-mapping.dmp
    • memory/644-3-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/644-5-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/732-2-0x0000000000F40000-0x0000000000F41000-memory.dmp
      Filesize

      4KB