Analysis
-
max time kernel
39s -
max time network
40s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
22-04-2021 00:02
Static task
static1
Behavioral task
behavioral1
Sample
ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe
-
Size
693KB
-
MD5
289691163ea5795a930703689eb1b3b9
-
SHA1
46dc959dc6848a44d6930d00ad2a9e60db08e47b
-
SHA256
ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be
-
SHA512
c6b80acde7a18f17578c27fc993786bdca3623a56591362cbcda314ae23a05c245b853f44bf08d20a4400b195452a2af1007b3458352fe562131ebbd8654f7df
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://31.210.20.121/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exedescription pid process target process PID 772 set thread context of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exedescription pid process target process PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe PID 772 wrote to memory of 628 772 ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe"C:\Users\Admin\AppData\Local\Temp\ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ba5786cfe255f158264fabd0b0cbf90b6f96ddd230a5fe82ca0c551d420f95be.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/628-63-0x000000000041A1F8-mapping.dmp
-
memory/628-62-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/628-65-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/772-60-0x0000000075EF1000-0x0000000075EF3000-memory.dmpFilesize
8KB
-
memory/772-61-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/772-64-0x00000000003D1000-0x00000000003D2000-memory.dmpFilesize
4KB