Analysis
-
max time kernel
135s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 08:08
Static task
static1
Behavioral task
behavioral1
Sample
3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe
Resource
win10v2004-20220414-en
General
-
Target
3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe
-
Size
4.6MB
-
MD5
41c1385121b1c992fb938e297d0afcc8
-
SHA1
ecf24ccd2a94799bd637d7b3d2b5d734b95189f0
-
SHA256
3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f
-
SHA512
33fda8b803d7fd637c61409a990fcbdc1988f7e99f0459b550c21312e0d9c510e41b35b44435b0d4126aea8dbc8d554f28e3f5e3bab1e4ac9d3798e5d8e4a1fb
Malware Config
Extracted
azorult
http://51.75.24.146/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15
-
Loads dropped DLL 1 IoCs
Processes:
3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exepid process 1340 3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exedescription pid process Token: 33 1340 3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe Token: SeIncBasePriorityPrivilege 1340 3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe Token: 33 1340 3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe Token: SeIncBasePriorityPrivilege 1340 3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exepid process 1340 3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe"C:\Users\Admin\AppData\Local\Temp\3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Turbo.net\Sandbox\Wise Data Recovery \4.0.7 \local\temp\1340_00400000_tls.dllFilesize
1024B
MD5eb23168ee6b406bb07d98c212799a839
SHA126168b76af02d8c855cb3b93560a81bd09d782c7
SHA2565ba6d143bfac6c3c190ae0f6fab1cb168ea04d1ec7e202a80c502e773ca392d7
SHA512bedb9266fecab4e4ee749a2720795b54abe11e99ca7747e9b9ff0615d112e23250d1223fe663a24feb591b6d804557158f891d9ba826924005fec8d6927d2eb8
-
memory/1340-142-0x0000000010000000-0x0000000010099000-memory.dmpFilesize
612KB
-
memory/1340-198-0x0000000000400000-0x00000000005CD000-memory.dmpFilesize
1.8MB
-
memory/1340-141-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-135-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-137-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-138-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-136-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-139-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-134-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-133-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-147-0x0000000010000000-0x0000000010099000-memory.dmpFilesize
612KB
-
memory/1340-148-0x0000000010000000-0x0000000010099000-memory.dmpFilesize
612KB
-
memory/1340-149-0x0000000000400000-0x00000000005CD000-memory.dmpFilesize
1.8MB
-
memory/1340-132-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-157-0x0000000074360000-0x0000000074362000-memory.dmpFilesize
8KB
-
memory/1340-195-0x0000000000880000-0x00000000008A7000-memory.dmpFilesize
156KB
-
memory/1340-196-0x0000000000881000-0x000000000089E000-memory.dmpFilesize
116KB
-
memory/1340-197-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB
-
memory/1340-131-0x0000000000E10000-0x0000000001295000-memory.dmpFilesize
4.5MB