Analysis
-
max time kernel
42s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
06-05-2021 08:11
Static task
static1
Behavioral task
behavioral1
Sample
Reqest for Quotation.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Reqest for Quotation.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Reqest for Quotation.exe
-
Size
650KB
-
MD5
9d544edbac1411fd5c7ce439100680f8
-
SHA1
6ef2e1a2e35533777478b3b4f9b7d67c5a53b69d
-
SHA256
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f
-
SHA512
e415c48ef9390a3ce7c09af437acfa56b8ed72d5c2718f3ddea36e14eae42bb81d380b6efd7373b182a1c590421f33864c5a7bd7b4e278429fa863f83a45953c
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://31.210.21.194/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Reqest for Quotation.exedescription pid process target process PID 4024 set thread context of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Reqest for Quotation.exepid process 4024 Reqest for Quotation.exe 4024 Reqest for Quotation.exe 4024 Reqest for Quotation.exe 4024 Reqest for Quotation.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Reqest for Quotation.exedescription pid process Token: SeDebugPrivilege 4024 Reqest for Quotation.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Reqest for Quotation.exedescription pid process target process PID 4024 wrote to memory of 3828 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 3828 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 3828 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 3628 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 3628 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 3628 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe PID 4024 wrote to memory of 2648 4024 Reqest for Quotation.exe Reqest for Quotation.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Reqest for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Reqest for Quotation.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\Reqest for Quotation.exe"{path}"2⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\Reqest for Quotation.exe"{path}"2⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\Reqest for Quotation.exe"{path}"2⤵PID:2648