Malware Analysis Report

2025-08-05 14:30

Sample ID 220523-b8py3aeghj
Target 56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
SHA256 56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3
Tags
azorult infostealer persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3

Threat Level: Known bad

The file 56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe was found to be: Known bad.

Malicious Activity Summary

azorult infostealer persistence trojan

Azorult

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Delays execution with timeout.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-05-23 01:49

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-23 01:49

Reported

2022-05-23 01:57

Platform

win7-20220414-en

Max time kernel

43s

Max time network

48s

Command Line

"C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe"

Signatures

Azorult

trojan infostealer azorult

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox = "\"C:\\Users\\Admin\\AppData\\Local\\firefox.exe\"" C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe N/A

Enumerates physical storage devices

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 276 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Windows\SysWOW64\cmd.exe
PID 276 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Windows\SysWOW64\cmd.exe
PID 276 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Windows\SysWOW64\cmd.exe
PID 276 wrote to memory of 1780 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Windows\SysWOW64\cmd.exe
PID 1780 wrote to memory of 1488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1780 wrote to memory of 1488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1780 wrote to memory of 1488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1780 wrote to memory of 1488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 276 wrote to memory of 912 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

Processes

C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

"C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 20

C:\Windows\SysWOW64\timeout.exe

timeout 20

C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 bl1we4t.xyz udp
US 8.8.8.8:53 bl1we4t.xyz udp

Files

memory/276-54-0x0000000001310000-0x0000000001484000-memory.dmp

memory/276-55-0x00000000053C0000-0x000000000552E000-memory.dmp

memory/276-56-0x0000000075721000-0x0000000075723000-memory.dmp

memory/1780-57-0x0000000000000000-mapping.dmp

memory/1488-58-0x0000000000000000-mapping.dmp

memory/276-59-0x0000000000CA0000-0x0000000000CDA000-memory.dmp

memory/912-60-0x0000000000400000-0x0000000000420000-memory.dmp

memory/912-61-0x0000000000400000-0x0000000000420000-memory.dmp

memory/912-63-0x0000000000400000-0x0000000000420000-memory.dmp

memory/912-64-0x0000000000400000-0x0000000000420000-memory.dmp

memory/912-65-0x0000000000400000-0x0000000000420000-memory.dmp

memory/912-67-0x0000000000400000-0x0000000000420000-memory.dmp

memory/912-68-0x000000000041A684-mapping.dmp

memory/912-70-0x0000000000400000-0x0000000000420000-memory.dmp

memory/912-72-0x0000000000400000-0x0000000000420000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-23 01:49

Reported

2022-05-23 01:57

Platform

win10v2004-20220414-en

Max time kernel

136s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe"

Signatures

Azorult

trojan infostealer azorult

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\firefox = "\"C:\\Users\\Admin\\AppData\\Local\\firefox.exe\"" C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe N/A

Enumerates physical storage devices

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3824 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Windows\SysWOW64\cmd.exe
PID 3824 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Windows\SysWOW64\cmd.exe
PID 3824 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Windows\SysWOW64\cmd.exe
PID 5108 wrote to memory of 1960 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 5108 wrote to memory of 1960 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 5108 wrote to memory of 1960 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe
PID 3824 wrote to memory of 444 N/A C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

Processes

C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

"C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 20

C:\Windows\SysWOW64\timeout.exe

timeout 20

C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

C:\Users\Admin\AppData\Local\Temp\56a7ba5c7f4590079508c1b90bfd200d00838daee3fbcd5602d7299fa0cbc4e3.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 bl1we4t.xyz udp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 bl1we4t.xyz udp
IE 13.69.239.73:443 tcp
US 8.8.8.8:53 176.122.125.40.in-addr.arpa udp
US 67.26.211.254:80 tcp
US 67.26.211.254:80 tcp
US 93.184.220.29:80 tcp
US 204.79.197.203:80 tcp

Files

memory/3824-130-0x0000000000180000-0x00000000002F4000-memory.dmp

memory/3824-131-0x00000000059E0000-0x0000000005FF8000-memory.dmp

memory/3824-132-0x00000000065B0000-0x0000000006B54000-memory.dmp

memory/3824-133-0x0000000005560000-0x00000000055F2000-memory.dmp

memory/5108-134-0x0000000000000000-mapping.dmp

memory/1960-135-0x0000000000000000-mapping.dmp

memory/444-136-0x0000000000000000-mapping.dmp

memory/444-137-0x0000000000400000-0x0000000000420000-memory.dmp

memory/444-139-0x0000000000400000-0x0000000000420000-memory.dmp

memory/444-140-0x0000000000400000-0x0000000000420000-memory.dmp