Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-05-2021 10:06
Static task
static1
Behavioral task
behavioral1
Sample
Req for Quote.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Req for Quote.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Req for Quote.exe
-
Size
1.1MB
-
MD5
3edf540c2cac6f08dd893c30ee05e392
-
SHA1
ebe6d5f431e029976d6a63e752d78a2ade56a737
-
SHA256
a7167a16b72e8a302fd2861103595f01d20f1440d98945fadbbd0dca0425e089
-
SHA512
05e6b9ffb1d25673ba9c6cdbf5f3b69a6bb9c6fac2618a5bd0be9aa4fd365f273f73384c60afffe0eaeeb083c1df95d5adc737f6f3174762bf4bef320f036ad8
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://31.210.21.194/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Req for Quote.exedescription pid process target process PID 808 set thread context of 936 808 Req for Quote.exe Req for Quote.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Req for Quote.exepid process 808 Req for Quote.exe 808 Req for Quote.exe 808 Req for Quote.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Req for Quote.exedescription pid process Token: SeDebugPrivilege 808 Req for Quote.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Req for Quote.exedescription pid process target process PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe PID 808 wrote to memory of 936 808 Req for Quote.exe Req for Quote.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Req for Quote.exe"C:\Users\Admin\AppData\Local\Temp\Req for Quote.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Req for Quote.exe"{path}"2⤵PID:936