Analysis
-
max time kernel
144s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
3032fe1f3ccba6331c1f3efd27b12672be276656e86435942874dc41f17ef0dd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3032fe1f3ccba6331c1f3efd27b12672be276656e86435942874dc41f17ef0dd.exe
Resource
win10v2004-20220414-en
General
-
Target
3032fe1f3ccba6331c1f3efd27b12672be276656e86435942874dc41f17ef0dd.exe
-
Size
261KB
-
MD5
170f2f204584c4037c240c06ef116644
-
SHA1
4b83b83a819273ba2bd875b022fb6632b5042f61
-
SHA256
3032fe1f3ccba6331c1f3efd27b12672be276656e86435942874dc41f17ef0dd
-
SHA512
073fbf28e5a1661f74957417afaa9422e3f0ec4de1831b732a48197f43865a57dce4e7b975d6f9133f6da2e41ee7f43911cc6647780484b09c4a9cf816f1218b
Malware Config
Extracted
azorult
http://62.197.136.120/purelogs/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3652 3764 WerFault.exe 3032fe1f3ccba6331c1f3efd27b12672be276656e86435942874dc41f17ef0dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3032fe1f3ccba6331c1f3efd27b12672be276656e86435942874dc41f17ef0dd.exe"C:\Users\Admin\AppData\Local\Temp\3032fe1f3ccba6331c1f3efd27b12672be276656e86435942874dc41f17ef0dd.exe"1⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 12282⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3764 -ip 37641⤵PID:4728