Analysis
-
max time kernel
161s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 09:45
Static task
static1
Behavioral task
behavioral1
Sample
3bc13b6c499c632b94e2b1fd7d83d4adaf96d3f147b8e0ab302d74bcda9a82b1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3bc13b6c499c632b94e2b1fd7d83d4adaf96d3f147b8e0ab302d74bcda9a82b1.exe
Resource
win10v2004-20220414-en
General
-
Target
3bc13b6c499c632b94e2b1fd7d83d4adaf96d3f147b8e0ab302d74bcda9a82b1.exe
-
Size
264KB
-
MD5
6bf4098d9eeb743ffe314362b0d7b52d
-
SHA1
cf5bab29b03e6419d57ad2f55a973757182aa236
-
SHA256
3bc13b6c499c632b94e2b1fd7d83d4adaf96d3f147b8e0ab302d74bcda9a82b1
-
SHA512
36d783f3287ed58b7c0d594dcd614c3651ae39a1b1801e075de6e931184f2f805ad6772a9fd4fe6cc063d4584a0ab68f7aa348fd02e367e71b5eeab4a74b374e
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5100 2452 WerFault.exe 3bc13b6c499c632b94e2b1fd7d83d4adaf96d3f147b8e0ab302d74bcda9a82b1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc13b6c499c632b94e2b1fd7d83d4adaf96d3f147b8e0ab302d74bcda9a82b1.exe"C:\Users\Admin\AppData\Local\Temp\3bc13b6c499c632b94e2b1fd7d83d4adaf96d3f147b8e0ab302d74bcda9a82b1.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 14482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2452 -ip 24521⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2452-130-0x000000000334E000-0x000000000335F000-memory.dmpFilesize
68KB
-
memory/2452-131-0x000000000334E000-0x000000000335F000-memory.dmpFilesize
68KB
-
memory/2452-132-0x0000000000400000-0x0000000003041000-memory.dmpFilesize
44.3MB
-
memory/2452-133-0x0000000000400000-0x0000000003041000-memory.dmpFilesize
44.3MB
-
memory/2452-134-0x0000000000400000-0x0000000003041000-memory.dmpFilesize
44.3MB