Analysis
-
max time kernel
83s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-04-2021 14:30
Static task
static1
Behavioral task
behavioral1
Sample
gunzipped.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
gunzipped.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
gunzipped.exe
-
Size
611KB
-
MD5
45a4af98d9afdab6c5f709d4fffb1726
-
SHA1
f6b11554a14ef1d414945e7df008dc9e70b48fcc
-
SHA256
17acf24c05c7bca527ec089ff2581de0a54e8793a89027cb3beea7bdedbf6296
-
SHA512
4b19dc70d5fe786ac51b3c330da905ebbb6b50e34f1f48222fb44aeb4236e23cf5d0262b805b0f5b26d1840052de8080894a027953065839d45a1ab77a629fdb
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://45.76.21.114/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
gunzipped.exedescription pid process target process PID 668 set thread context of 1380 668 gunzipped.exe gunzipped.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
gunzipped.exepid process 668 gunzipped.exe 668 gunzipped.exe 668 gunzipped.exe 668 gunzipped.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
gunzipped.exedescription pid process Token: SeDebugPrivilege 668 gunzipped.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
gunzipped.exedescription pid process target process PID 668 wrote to memory of 2284 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 2284 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 2284 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 2044 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 2044 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 2044 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe PID 668 wrote to memory of 1380 668 gunzipped.exe gunzipped.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\gunzipped.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/668-114-0x0000000002FC0000-0x0000000002FC1000-memory.dmpFilesize
4KB
-
memory/1380-115-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1380-116-0x000000000041A1F8-mapping.dmp
-
memory/1380-117-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB