Analysis

  • max time kernel
    135s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-07-2022 08:08

General

  • Target

    3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe

  • Size

    4.6MB

  • MD5

    41c1385121b1c992fb938e297d0afcc8

  • SHA1

    ecf24ccd2a94799bd637d7b3d2b5d734b95189f0

  • SHA256

    3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f

  • SHA512

    33fda8b803d7fd637c61409a990fcbdc1988f7e99f0459b550c21312e0d9c510e41b35b44435b0d4126aea8dbc8d554f28e3f5e3bab1e4ac9d3798e5d8e4a1fb

Malware Config

Extracted

Family

azorult

C2

http://51.75.24.146/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

    suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

  • Loads dropped DLL 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe
    "C:\Users\Admin\AppData\Local\Temp\3c3e5ce6985877e985e832b5f3b9fe881c71cf7de4f891cec7a0f6a930758f8f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:1340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Turbo.net\Sandbox\Wise Data Recovery \4.0.7 \local\temp\1340_00400000_tls.dll
    Filesize

    1024B

    MD5

    eb23168ee6b406bb07d98c212799a839

    SHA1

    26168b76af02d8c855cb3b93560a81bd09d782c7

    SHA256

    5ba6d143bfac6c3c190ae0f6fab1cb168ea04d1ec7e202a80c502e773ca392d7

    SHA512

    bedb9266fecab4e4ee749a2720795b54abe11e99ca7747e9b9ff0615d112e23250d1223fe663a24feb591b6d804557158f891d9ba826924005fec8d6927d2eb8

  • memory/1340-142-0x0000000010000000-0x0000000010099000-memory.dmp
    Filesize

    612KB

  • memory/1340-198-0x0000000000400000-0x00000000005CD000-memory.dmp
    Filesize

    1.8MB

  • memory/1340-141-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-135-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-137-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-138-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-136-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-139-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-134-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-133-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-147-0x0000000010000000-0x0000000010099000-memory.dmp
    Filesize

    612KB

  • memory/1340-148-0x0000000010000000-0x0000000010099000-memory.dmp
    Filesize

    612KB

  • memory/1340-149-0x0000000000400000-0x00000000005CD000-memory.dmp
    Filesize

    1.8MB

  • memory/1340-132-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-157-0x0000000074360000-0x0000000074362000-memory.dmp
    Filesize

    8KB

  • memory/1340-195-0x0000000000880000-0x00000000008A7000-memory.dmp
    Filesize

    156KB

  • memory/1340-196-0x0000000000881000-0x000000000089E000-memory.dmp
    Filesize

    116KB

  • memory/1340-197-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB

  • memory/1340-131-0x0000000000E10000-0x0000000001295000-memory.dmp
    Filesize

    4.5MB