Analysis
-
max time kernel
173s -
max time network
215s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2022 20:23
Static task
static1
Behavioral task
behavioral1
Sample
61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe
Resource
win10v2004-20220721-en
General
-
Target
61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe
-
Size
848KB
-
MD5
76492cf4fc3ae53aea1b6eaacd262a0d
-
SHA1
0625807598d4b93b6ba296acc9e4d6ed18cea0e1
-
SHA256
61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264
-
SHA512
f2305f9b2374e35c805210342e7a6f96bd17845c50166d7113a11b3b9ce81976a09bbcfd11845a0f8dfd3e1f0f9bfc5195cd6983702d746ac97ecd2e34306b6a
Malware Config
Extracted
azorult
http://91.243.80.91/123/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exedescription pid process target process PID 1272 set thread context of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exepid process 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exedescription pid process target process PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe PID 1272 wrote to memory of 1620 1272 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe 61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe"C:\Users\Admin\AppData\Local\Temp\61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe"C:\Users\Admin\AppData\Local\Temp\61b1c2c9d05f495415e285de029b7ca8380f29c6ce43d7aae9633ac80bf00264.exe"2⤵PID:1620
-