Analysis
-
max time kernel
41s -
max time network
40s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
30-04-2021 02:53
Static task
static1
Behavioral task
behavioral1
Sample
633.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
633.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
633.exe
-
Size
930KB
-
MD5
f07c300806da3a9c9a55bc7037db2bb7
-
SHA1
5b89e3c5706647945eeb5d3d10b7bdf4a60bf264
-
SHA256
44a553892af9e23cabd74bef11e9bc8fe08dd0f111a482248f90e8d2f54ae06e
-
SHA512
5b68c7a137c40aa86eccf5bbb5ae526a630fc7a239b81673b9c253998b4b4369b0a0e08784f77d85f3a64c44eb0247ba8771c351a66d59b193501c6aff2fcf9b
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://31.210.20.121/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
633.exedescription pid process target process PID 1996 set thread context of 1716 1996 633.exe 633.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
633.exepid process 1996 633.exe 1996 633.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
633.exedescription pid process Token: SeDebugPrivilege 1996 633.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
633.exedescription pid process target process PID 1996 wrote to memory of 316 1996 633.exe 633.exe PID 1996 wrote to memory of 316 1996 633.exe 633.exe PID 1996 wrote to memory of 316 1996 633.exe 633.exe PID 1996 wrote to memory of 316 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe PID 1996 wrote to memory of 1716 1996 633.exe 633.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\633.exe"C:\Users\Admin\AppData\Local\Temp\633.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\633.exe"{path}"2⤵PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\633.exe"{path}"2⤵PID:1716
-