Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe
Resource
win10v2004-20220414-en
General
-
Target
f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe
-
Size
300KB
-
MD5
6bf580ccfa8cdef620ba37082e5f7d66
-
SHA1
d0e590d8615e640cc563a5d6294df8278ae3f2e5
-
SHA256
f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8
-
SHA512
f6023345ca884ae4200748a17dc6f45e9001a2de5e09c278298968fd091c91f27c1ee6cfcc11b3934ed02b430a5e34d921aa4ff171db2e86656f0a0a2b49ca5e
Malware Config
Extracted
azorult
http://2.56.59.31/purelogs/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M13
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M13
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2716 2556 WerFault.exe f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe"C:\Users\Admin\AppData\Local\Temp\f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe"1⤵PID:2556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 12482⤵
- Program crash
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2556 -ip 25561⤵PID:1724