Analysis
-
max time kernel
111s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:22
Static task
static1
Behavioral task
behavioral1
Sample
RFQ PC00056942.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ PC00056942.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
TECHNICAL SHEET.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
TECHNICAL SHEET.exe
Resource
win10v2004-20220414-en
General
-
Target
RFQ PC00056942.exe
-
Size
285KB
-
MD5
49226c62012170c00a4cccae8d61c363
-
SHA1
aa1af05c892e18e611f153263bd5582536243de6
-
SHA256
b7867882baba4d27ac04f4b537b20a90166c5d3c82247f84ed338cf7cafba649
-
SHA512
6a56506a92148ada8a9e0562fc6bc18c594cd4047108e9921d8d15ef5499b9628674b54ef37ed32a9c345c9c4ab43b4f983bd4ca77320da374991ef41f518da7
Malware Config
Extracted
azorult
http://217.160.254.33/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ PC00056942.exedescription pid process target process PID 1564 set thread context of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RFQ PC00056942.exepid process 1564 RFQ PC00056942.exe 1564 RFQ PC00056942.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RFQ PC00056942.exedescription pid process Token: SeDebugPrivilege 1564 RFQ PC00056942.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
RFQ PC00056942.exedescription pid process target process PID 1564 wrote to memory of 816 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 816 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 816 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 816 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2028 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2028 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2028 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2028 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe PID 1564 wrote to memory of 2016 1564 RFQ PC00056942.exe RFQ PC00056942.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ PC00056942.exe"C:\Users\Admin\AppData\Local\Temp\RFQ PC00056942.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\RFQ PC00056942.exe"{path}"2⤵PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ PC00056942.exe"{path}"2⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ PC00056942.exe"{path}"2⤵PID:2016
-