Analysis
-
max time kernel
115s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
05-10-2021 06:02
Static task
static1
Behavioral task
behavioral1
Sample
60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe
Resource
win10-en-20210920
General
-
Target
60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe
-
Size
850KB
-
MD5
68c2be38e5bedebceb5108b798bb760c
-
SHA1
d60414646d66c39820bad63ed69739a0521f807f
-
SHA256
60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb
-
SHA512
e14e9b8883d8059d6603ba0bba52dafdcf0fa88d93f5f79f73a0c5e309467cce7baed0d64f6e85f1df150c2ebee088d0404ebc62b84dea2fea90328e087a5944
Malware Config
Extracted
azorult
http://212.193.30.181/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exedescription pid process target process PID 1812 set thread context of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exedescription pid process target process PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe PID 1812 wrote to memory of 1700 1812 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe 60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe"C:\Users\Admin\AppData\Local\Temp\60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\60bf55c622f01b6d0796fe3415226d66f8650a9ec5c5aff515777f9c3ac107eb.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1700-117-0x000000000041A1F8-mapping.dmp
-
memory/1700-116-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1700-119-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1812-115-0x0000000001670000-0x0000000001671000-memory.dmpFilesize
4KB
-
memory/1812-118-0x0000000001671000-0x0000000001672000-memory.dmpFilesize
4KB