Analysis Overview
SHA256
f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901
Threat Level: Known bad
The file f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901 was found to be: Known bad.
Malicious Activity Summary
Azorult
suricata: ET MALWARE AZORult Variant.4 Checkin M2
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M4
Suspicious use of SetThreadContext
Program crash
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-05-20 18:48
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2022-05-20 18:48
Reported
2022-05-20 18:52
Platform
win10v2004-20220414-en
Max time kernel
194s
Max time network
206s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe
"C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2124 -ip 2124
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 8876
Network
| Country | Destination | Domain | Proto |
| US | 52.109.8.19:443 | tcp | |
| NL | 104.97.14.81:80 | tcp | |
| NL | 20.50.201.200:443 | tcp | |
| IE | 20.54.110.249:443 | tcp | |
| NL | 87.248.202.1:80 | tcp | |
| NL | 87.248.202.1:80 | tcp | |
| NL | 20.190.160.73:443 | tcp | |
| NL | 20.190.160.73:443 | tcp | |
| NL | 20.190.160.67:443 | tcp | |
| NL | 20.190.160.67:443 | tcp | |
| NL | 20.190.160.67:443 | tcp | |
| NL | 20.190.160.2:443 | tcp | |
| NL | 20.190.160.2:443 | tcp | |
| NL | 20.190.160.2:443 | tcp | |
| NL | 20.190.160.136:443 | tcp | |
| NL | 20.190.160.136:443 | tcp | |
| NL | 20.190.160.136:443 | tcp | |
| NL | 20.190.160.136:443 | tcp | |
| NL | 20.190.160.129:443 | tcp | |
| NL | 20.190.160.129:443 | tcp | |
| NL | 20.190.160.129:443 | tcp | |
| NL | 20.190.160.129:443 | tcp | |
| NL | 20.190.160.6:443 | tcp | |
| NL | 20.190.160.6:443 | tcp | |
| NL | 20.190.160.6:443 | tcp | |
| NL | 20.190.160.6:443 | tcp | |
| NL | 20.190.160.6:443 | tcp |
Files
memory/2124-130-0x0000000000800000-0x000000000089C000-memory.dmp
memory/2124-131-0x0000000002C50000-0x0000000002C53000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2022-05-20 18:48
Reported
2022-05-20 18:51
Platform
win7-20220414-en
Max time kernel
42s
Max time network
45s
Command Line
Signatures
Azorult
suricata: ET MALWARE AZORult Variant.4 Checkin M2
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M4
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1836 set thread context of 908 | N/A | C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe | C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe
"C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe"
C:\Users\Admin\AppData\Local\Temp\f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe
"f30de1eaa6131b558d7ea14e86add8ec22cebb6b988715753745b12e46906901.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 744
Network
| Country | Destination | Domain | Proto |
| NL | 185.43.220.15:80 | 185.43.220.15 | tcp |
Files
memory/1836-54-0x00000000012E0000-0x000000000137C000-memory.dmp
memory/1836-55-0x0000000000480000-0x00000000004AC000-memory.dmp
memory/1836-56-0x0000000074F91000-0x0000000074F93000-memory.dmp
memory/908-57-0x000000000041A1F8-mapping.dmp
memory/1836-58-0x00000000004C0000-0x00000000004C3000-memory.dmp
memory/908-60-0x0000000000400000-0x0000000000420000-memory.dmp
memory/1636-61-0x0000000000000000-mapping.dmp