Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 06:57
Static task
static1
Behavioral task
behavioral1
Sample
c88a5164ed8096987fec3ad792484f70034f5f1da0d22c5c9d32520a9c7c8ac2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c88a5164ed8096987fec3ad792484f70034f5f1da0d22c5c9d32520a9c7c8ac2.exe
Resource
win10v2004-20220414-en
General
-
Target
c88a5164ed8096987fec3ad792484f70034f5f1da0d22c5c9d32520a9c7c8ac2.exe
-
Size
230KB
-
MD5
5adcf50e6c42524cac8c38049bf14eec
-
SHA1
78aa0e7a40d22a59b437c5a5609609af7d54ae13
-
SHA256
c88a5164ed8096987fec3ad792484f70034f5f1da0d22c5c9d32520a9c7c8ac2
-
SHA512
8bca81a231f89ecb4ecf3a2bab4fd4c69b5c7f9cceee96984ed923c443d550d9cc37249f02d83dec47aeac946840d15e6b3310aae40bb878c95aeae05f0b7135
Malware Config
Extracted
azorult
http://khaliddib398.xyz/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3952 4144 WerFault.exe c88a5164ed8096987fec3ad792484f70034f5f1da0d22c5c9d32520a9c7c8ac2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88a5164ed8096987fec3ad792484f70034f5f1da0d22c5c9d32520a9c7c8ac2.exe"C:\Users\Admin\AppData\Local\Temp\c88a5164ed8096987fec3ad792484f70034f5f1da0d22c5c9d32520a9c7c8ac2.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 13842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4144 -ip 41441⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4144-130-0x0000000000DF7000-0x0000000000E08000-memory.dmpFilesize
68KB
-
memory/4144-131-0x0000000000C90000-0x0000000000CAD000-memory.dmpFilesize
116KB
-
memory/4144-132-0x0000000000400000-0x0000000000B7F000-memory.dmpFilesize
7.5MB
-
memory/4144-133-0x0000000000DF7000-0x0000000000E08000-memory.dmpFilesize
68KB
-
memory/4144-134-0x0000000000400000-0x0000000000B7F000-memory.dmpFilesize
7.5MB