Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
06-05-2021 12:05
Static task
static1
Behavioral task
behavioral1
Sample
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe
Resource
win10v20210410
General
-
Target
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe
-
Size
650KB
-
MD5
9d544edbac1411fd5c7ce439100680f8
-
SHA1
6ef2e1a2e35533777478b3b4f9b7d67c5a53b69d
-
SHA256
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f
-
SHA512
e415c48ef9390a3ce7c09af437acfa56b8ed72d5c2718f3ddea36e14eae42bb81d380b6efd7373b182a1c590421f33864c5a7bd7b4e278429fa863f83a45953c
Malware Config
Extracted
azorult
http://31.210.21.194/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exedescription pid process target process PID 1748 set thread context of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exepid process 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exedescription pid process Token: SeDebugPrivilege 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exedescription pid process target process PID 1748 wrote to memory of 868 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 868 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 868 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 868 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe PID 1748 wrote to memory of 1312 1748 db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe"C:\Users\Admin\AppData\Local\Temp\db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe"{path}"2⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\db983ec8265e31a052ec43b742f1f266225f09d07a6a6a67947fbaabb42ef73f.exe"{path}"2⤵PID:1312