Analysis
-
max time kernel
151s -
max time network
92s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-07-2021 16:05
Static task
static1
Behavioral task
behavioral1
Sample
egdgh.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
egdgh.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
egdgh.exe
-
Size
839KB
-
MD5
5d751931eb3477f5e7d340606b381db2
-
SHA1
011c86381eabf328aa69260b0812ae534d950101
-
SHA256
8085b13eb5097f9107ef826115461f4ff755b81c5ec97b3378f2325d06651d2c
-
SHA512
965076d7d98f3265fb58d075e4e17f4d73086af64ec32fa042cbe3e2a717796ec2ecafc0cd755d39c5c208aa85b210bbd17096666bca0086eb04d7e31ebbedc5
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://itthonfiatalon.hu/temp/reo/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M1
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
egdgh.exedescription pid process target process PID 1820 set thread context of 524 1820 egdgh.exe egdgh.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
egdgh.exedescription pid process target process PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe PID 1820 wrote to memory of 524 1820 egdgh.exe egdgh.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/524-66-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/524-67-0x000000000041A1F8-mapping.dmp
-
memory/524-68-0x0000000076641000-0x0000000076643000-memory.dmpFilesize
8KB
-
memory/524-69-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1820-60-0x0000000000870000-0x0000000000871000-memory.dmpFilesize
4KB
-
memory/1820-62-0x00000000048B0000-0x00000000048B1000-memory.dmpFilesize
4KB
-
memory/1820-63-0x0000000000530000-0x000000000054B000-memory.dmpFilesize
108KB
-
memory/1820-64-0x0000000004FA0000-0x0000000005008000-memory.dmpFilesize
416KB
-
memory/1820-65-0x0000000004390000-0x00000000043B2000-memory.dmpFilesize
136KB