Analysis
-
max time kernel
125s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe
Resource
win10v2004-20220414-en
General
-
Target
2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe
-
Size
495KB
-
MD5
28c639c743ca0c9af8e46abc9d008b83
-
SHA1
aa5fb9beb8e12e2bee41a90cf9ef68cc3dc0c0eb
-
SHA256
2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce
-
SHA512
1e454c58df3f7b427a764da1c5153fe305d01260ad32a0a03c7540bc56454cffac69cc585177ac31abc646c649d9d15e14eb1b49c983007900eca69a8089334e
Malware Config
Extracted
azorult
http://5.161.106.206/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exedescription pid process target process PID 2640 set thread context of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exedescription pid process target process PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe PID 2640 wrote to memory of 4440 2640 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe 2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe"C:\Users\Admin\AppData\Local\Temp\2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\2e970a59c6813b50be54a729c3e4939347302f73bc302e3227114b73d0ec7dce.exe"{path}"2⤵PID:4440
-