Analysis
-
max time kernel
139s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
PICTURE FOR ILLUSTRATION.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PICTURE FOR ILLUSTRATION.exe
Resource
win10v2004-20220414-en
General
-
Target
PICTURE FOR ILLUSTRATION.exe
-
Size
212KB
-
MD5
025030d30646897352afc77898f4014b
-
SHA1
cb6edbf932827a5d92b39e74cbd1f3c7992fa1f1
-
SHA256
229aaa16670e60669a955690e0104fdd3e0e2621974b11d6dbb9804aea38f963
-
SHA512
58cb66cc15886a67af396342fec8a7923a78818103b967d853944c9640768cae5624dc04ee821c9f9142b2bcb9887477de202538ba06a7f8ee8ddc5771da3d1e
Malware Config
Extracted
azorult
http://217.160.246.104/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/892-56-0x0000000000D20000-0x0000000000D4A000-memory.dmp rezer0 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PICTURE FOR ILLUSTRATION.exedescription pid process target process PID 892 set thread context of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
PICTURE FOR ILLUSTRATION.exepid process 892 PICTURE FOR ILLUSTRATION.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PICTURE FOR ILLUSTRATION.exedescription pid process Token: SeDebugPrivilege 892 PICTURE FOR ILLUSTRATION.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
PICTURE FOR ILLUSTRATION.exedescription pid process target process PID 892 wrote to memory of 836 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 836 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 836 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 836 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 892 wrote to memory of 1736 892 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PICTURE FOR ILLUSTRATION.exe"C:\Users\Admin\AppData\Local\Temp\PICTURE FOR ILLUSTRATION.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PICTURE FOR ILLUSTRATION.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\PICTURE FOR ILLUSTRATION.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/892-54-0x0000000000DA0000-0x0000000000DDC000-memory.dmpFilesize
240KB
-
memory/892-55-0x0000000000390000-0x0000000000398000-memory.dmpFilesize
32KB
-
memory/892-56-0x0000000000D20000-0x0000000000D4A000-memory.dmpFilesize
168KB
-
memory/1736-57-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1736-58-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1736-60-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1736-61-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1736-62-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1736-64-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1736-65-0x000000000041A1F8-mapping.dmp
-
memory/1736-67-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1736-68-0x00000000755C1000-0x00000000755C3000-memory.dmpFilesize
8KB
-
memory/1736-69-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB