Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 02:33
Static task
static1
Behavioral task
behavioral1
Sample
3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe
Resource
win10v2004-20220414-en
General
-
Target
3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe
-
Size
1.1MB
-
MD5
00d25f974071e8f13046d14a9debafce
-
SHA1
9825ec9f4e8cdc9339f72d6f947fd84c0d5f810b
-
SHA256
3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e
-
SHA512
01ed9490bea262d6f78edd5a97e8c7a27d7c3d56bc389970a5b3dc1a5f37a96ff4cdf3947f04e3c05ba3eb8c93eb9fde26fd8f193a454c33c517ef5f4e65822c
Malware Config
Extracted
azorult
http://googletime.ac.ug/indexindex.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 4644 2304 3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe 87 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2304 wrote to memory of 4644 2304 3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe 87 PID 2304 wrote to memory of 4644 2304 3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe 87 PID 2304 wrote to memory of 4644 2304 3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe 87 PID 2304 wrote to memory of 4644 2304 3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe 87 PID 2304 wrote to memory of 4644 2304 3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe"C:\Users\Admin\AppData\Local\Temp\3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe"C:\Users\Admin\AppData\Local\Temp\3d9a7497fab651884aac2bcbb0f864d9bfee132d524fe64e9e7ed958f356140e.exe"2⤵PID:4644
-