Analysis
-
max time kernel
33s -
max time network
79s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-05-2021 13:57
Static task
static1
Behavioral task
behavioral1
Sample
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe
Resource
win10v20210408
General
-
Target
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe
-
Size
516KB
-
MD5
a528c174f1ca1b1171b7ce407e6df02e
-
SHA1
c1b92452ad2ee0b3c063d692b8d77e897b601694
-
SHA256
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c
-
SHA512
b1f1265392ce28bb654d4624b40c28755d038391ec54a5ddf4594433ce611734a04e1997fa2d62eb2108b8c51b36fa562aafd97d00473ebbb002dc6c29837c39
Malware Config
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exedescription pid process target process PID 1984 set thread context of 1772 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exepid process 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exepid process 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exedescription pid process target process PID 1984 wrote to memory of 796 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 796 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 796 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 796 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 1772 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 1772 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 1772 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 1772 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe PID 1984 wrote to memory of 1772 1984 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe 20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe"C:\Users\Admin\AppData\Local\Temp\20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe"C:\Users\Admin\AppData\Local\Temp\20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe"2⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe"C:\Users\Admin\AppData\Local\Temp\20a805f17da619a648db3066186c8d23822f09fa7903af559036796ae599791c.exe"2⤵PID:1772