Analysis

  • max time kernel
    68s
  • max time network
    71s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    30-04-2021 12:11

General

  • Target

    a6203ca5a80eb73bf0f245a482f68ce1ed689d9d57bfd943b3a82cdbc686391a.exe

  • Size

    922KB

  • MD5

    927af771cdf72afe226edace22bf6c04

  • SHA1

    34420017b8a8d5c3ed6f039c11a756c193765de7

  • SHA256

    a6203ca5a80eb73bf0f245a482f68ce1ed689d9d57bfd943b3a82cdbc686391a

  • SHA512

    1a9ff3d13c653f79f188820d409a1d219f1573e77d68ecc1755105f107ea10135b796b98b0a68e2e39e4dc01b0b758a80108fbd9ead1daa4a95d19a00c450784

Malware Config

Extracted

Family

azorult

C2

http://13.233.97.208/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6203ca5a80eb73bf0f245a482f68ce1ed689d9d57bfd943b3a82cdbc686391a.exe
    "C:\Users\Admin\AppData\Local\Temp\a6203ca5a80eb73bf0f245a482f68ce1ed689d9d57bfd943b3a82cdbc686391a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\a6203ca5a80eb73bf0f245a482f68ce1ed689d9d57bfd943b3a82cdbc686391a.exe
      "{path}"
      2⤵
        PID:800

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/800-64-0x000000000041A1F8-mapping.dmp

    • memory/800-63-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/800-66-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1920-60-0x0000000076691000-0x0000000076693000-memory.dmp

      Filesize

      8KB

    • memory/1920-61-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/1920-62-0x0000000000111000-0x0000000000112000-memory.dmp

      Filesize

      4KB