Analysis

  • max time kernel
    37s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    17-04-2021 06:01

General

  • Target

    f270e5838a9e760d920b64553ba77597a1550aacb2cbb557e0fff8d6a18fb714.exe

  • Size

    112KB

  • MD5

    d0f8261b811b4feed688f1f41df9f3d3

  • SHA1

    6ac3383dc13889ee1a00747104271aa482e1bcbc

  • SHA256

    f270e5838a9e760d920b64553ba77597a1550aacb2cbb557e0fff8d6a18fb714

  • SHA512

    82b7f42338d1f60fe246759f35e406b1e936cb6e64339e6314ce554621076794c21789a105f76d0edec2e78ed8292b4a7591bf737a3cf28a10b496e6d7536b26

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f270e5838a9e760d920b64553ba77597a1550aacb2cbb557e0fff8d6a18fb714.exe
    "C:\Users\Admin\AppData\Local\Temp\f270e5838a9e760d920b64553ba77597a1550aacb2cbb557e0fff8d6a18fb714.exe"
    1⤵
    • Modifies system certificate store
    PID:1628

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-60-0x0000000075551000-0x0000000075553000-memory.dmp
    Filesize

    8KB