Analysis
-
max time kernel
136s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2022 21:53
Static task
static1
Behavioral task
behavioral1
Sample
61335c8beebcfeaee694ab76e732d3b2a4cf41302a0e1ae47983b7b8f9ba7e8e.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
61335c8beebcfeaee694ab76e732d3b2a4cf41302a0e1ae47983b7b8f9ba7e8e.exe
Resource
win10v2004-20220721-en
General
-
Target
61335c8beebcfeaee694ab76e732d3b2a4cf41302a0e1ae47983b7b8f9ba7e8e.exe
-
Size
155KB
-
MD5
742e4a47963b3546c5fb3e8588d6e5d9
-
SHA1
555ceec795236da78a9501800ecb388b9e418621
-
SHA256
61335c8beebcfeaee694ab76e732d3b2a4cf41302a0e1ae47983b7b8f9ba7e8e
-
SHA512
1a4181157266446430ddfde03f9aa3ea1c29bb9043de7056e0a7d3a4d6ff289c93368defe7062196d1d5322b2ad40ed01608577ae5d481688cb59be7a905c638
Malware Config
Extracted
azorult
http://gtfurobertopol.org/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4680 4996 WerFault.exe 61335c8beebcfeaee694ab76e732d3b2a4cf41302a0e1ae47983b7b8f9ba7e8e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61335c8beebcfeaee694ab76e732d3b2a4cf41302a0e1ae47983b7b8f9ba7e8e.exe"C:\Users\Admin\AppData\Local\Temp\61335c8beebcfeaee694ab76e732d3b2a4cf41302a0e1ae47983b7b8f9ba7e8e.exe"1⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 13522⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4996 -ip 49961⤵PID:3152