Analysis
-
max time kernel
111s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
PICTURE FOR ILLUSTRATION.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PICTURE FOR ILLUSTRATION.exe
Resource
win10v2004-20220414-en
General
-
Target
PICTURE FOR ILLUSTRATION.exe
-
Size
212KB
-
MD5
025030d30646897352afc77898f4014b
-
SHA1
cb6edbf932827a5d92b39e74cbd1f3c7992fa1f1
-
SHA256
229aaa16670e60669a955690e0104fdd3e0e2621974b11d6dbb9804aea38f963
-
SHA512
58cb66cc15886a67af396342fec8a7923a78818103b967d853944c9640768cae5624dc04ee821c9f9142b2bcb9887477de202538ba06a7f8ee8ddc5771da3d1e
Malware Config
Extracted
azorult
http://217.160.246.104/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
PICTURE FOR ILLUSTRATION.exedescription pid process target process PID 3948 set thread context of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
PICTURE FOR ILLUSTRATION.exedescription pid process target process PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe PID 3948 wrote to memory of 3376 3948 PICTURE FOR ILLUSTRATION.exe PICTURE FOR ILLUSTRATION.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PICTURE FOR ILLUSTRATION.exe"C:\Users\Admin\AppData\Local\Temp\PICTURE FOR ILLUSTRATION.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PICTURE FOR ILLUSTRATION.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3376-134-0x0000000000000000-mapping.dmp
-
memory/3376-135-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3376-137-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3376-138-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3948-130-0x0000000000210000-0x000000000024C000-memory.dmpFilesize
240KB
-
memory/3948-131-0x0000000004B80000-0x0000000004C1C000-memory.dmpFilesize
624KB
-
memory/3948-132-0x0000000004CC0000-0x0000000004D52000-memory.dmpFilesize
584KB
-
memory/3948-133-0x0000000005880000-0x0000000005E24000-memory.dmpFilesize
5.6MB