Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 07:22
Static task
static1
Behavioral task
behavioral1
Sample
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe
Resource
win10v2004-20220721-en
General
-
Target
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe
-
Size
576KB
-
MD5
4cb66a8e9316b972da7edc116174671a
-
SHA1
92ae9e22fac220e782bce5fbb9679473e33a9771
-
SHA256
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775
-
SHA512
e44f9030b7c1ce855cd340580b4248c5d73df0b89a7c18dfee798a489eeddba99b4c4b55cebf6ce7fcc2317062a6435362be1452fd036a2c6d95890b4a36a21b
Malware Config
Extracted
azorult
http://aviskarprl.co.in/cgi/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exedescription pid process target process PID 2004 set thread context of 1352 2004 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exepid process 1352 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exepid process 2004 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exedescription pid process target process PID 2004 wrote to memory of 1352 2004 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe PID 2004 wrote to memory of 1352 2004 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe PID 2004 wrote to memory of 1352 2004 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe PID 2004 wrote to memory of 1352 2004 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe 69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe"C:\Users\Admin\AppData\Local\Temp\69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exeC:\Users\Admin\AppData\Local\Temp\69a57287ae2ff41565e572f7b36f3144ea8b5cfb38f5137540699fb00ff98775.exe"2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1352
-