Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 06:37
Behavioral task
behavioral1
Sample
f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe
Resource
win10v2004-20220722-en
General
-
Target
f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe
-
Size
294KB
-
MD5
a0e3b3cde4257e36a6f9c1ad30954b41
-
SHA1
fde540bd802143b4876ea346e5604936f62d4a93
-
SHA256
f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895
-
SHA512
626cdf5a79190800d4afbd74e754cd085e62946dea42c5dcc49d37f1a4fef1d7d0a1098bd7b48e8550e71baf5f8f279cb54dc7c3b3c4d18967482debec585470
Malware Config
Extracted
azorult
http://uzoma.ru/db2/3.3/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 3 IoCs
Processes:
sdhbhjsdhsd.exesdhbhjsdhsd.exesdhbhjsdhsd.exepid process 4744 sdhbhjsdhsd.exe 2152 sdhbhjsdhsd.exe 3468 sdhbhjsdhsd.exe -
Processes:
resource yara_rule behavioral2/memory/2260-132-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/2260-133-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/2260-134-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/2260-135-0x0000000000400000-0x00000000004D1000-memory.dmp upx C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe upx C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe upx C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe upx behavioral2/memory/4744-141-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/2152-142-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/4744-143-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/4744-144-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/2152-145-0x0000000000400000-0x00000000004D1000-memory.dmp upx behavioral2/memory/2152-146-0x0000000000400000-0x00000000004D1000-memory.dmp upx C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sdhbhjsdhsd.exedescription pid process target process PID 2152 set thread context of 3468 2152 sdhbhjsdhsd.exe sdhbhjsdhsd.exe -
NTFS ADS 1 IoCs
Processes:
f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe:ZoneIdentifier f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exesdhbhjsdhsd.exesdhbhjsdhsd.exepid process 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe 4744 sdhbhjsdhsd.exe 4744 sdhbhjsdhsd.exe 2152 sdhbhjsdhsd.exe 2152 sdhbhjsdhsd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
sdhbhjsdhsd.exepid process 2152 sdhbhjsdhsd.exe 2152 sdhbhjsdhsd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exesdhbhjsdhsd.exedescription pid process target process PID 2260 wrote to memory of 4744 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe sdhbhjsdhsd.exe PID 2260 wrote to memory of 4744 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe sdhbhjsdhsd.exe PID 2260 wrote to memory of 4744 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe sdhbhjsdhsd.exe PID 2260 wrote to memory of 2152 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe sdhbhjsdhsd.exe PID 2260 wrote to memory of 2152 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe sdhbhjsdhsd.exe PID 2260 wrote to memory of 2152 2260 f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe sdhbhjsdhsd.exe PID 2152 wrote to memory of 3468 2152 sdhbhjsdhsd.exe sdhbhjsdhsd.exe PID 2152 wrote to memory of 3468 2152 sdhbhjsdhsd.exe sdhbhjsdhsd.exe PID 2152 wrote to memory of 3468 2152 sdhbhjsdhsd.exe sdhbhjsdhsd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe"C:\Users\Admin\AppData\Local\Temp\f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe"1⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe" 1 "C:\Users\Admin\AppData\Local\Temp\f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895.exe" E58630A2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"3⤵
- Executes dropped EXE
PID:3468
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD5a0e3b3cde4257e36a6f9c1ad30954b41
SHA1fde540bd802143b4876ea346e5604936f62d4a93
SHA256f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895
SHA512626cdf5a79190800d4afbd74e754cd085e62946dea42c5dcc49d37f1a4fef1d7d0a1098bd7b48e8550e71baf5f8f279cb54dc7c3b3c4d18967482debec585470
-
Filesize
294KB
MD5a0e3b3cde4257e36a6f9c1ad30954b41
SHA1fde540bd802143b4876ea346e5604936f62d4a93
SHA256f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895
SHA512626cdf5a79190800d4afbd74e754cd085e62946dea42c5dcc49d37f1a4fef1d7d0a1098bd7b48e8550e71baf5f8f279cb54dc7c3b3c4d18967482debec585470
-
Filesize
294KB
MD5a0e3b3cde4257e36a6f9c1ad30954b41
SHA1fde540bd802143b4876ea346e5604936f62d4a93
SHA256f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895
SHA512626cdf5a79190800d4afbd74e754cd085e62946dea42c5dcc49d37f1a4fef1d7d0a1098bd7b48e8550e71baf5f8f279cb54dc7c3b3c4d18967482debec585470
-
Filesize
294KB
MD5a0e3b3cde4257e36a6f9c1ad30954b41
SHA1fde540bd802143b4876ea346e5604936f62d4a93
SHA256f168aeb37f55586709411c882ce34166905cf469c92d5535ea2c3fa5f24fc895
SHA512626cdf5a79190800d4afbd74e754cd085e62946dea42c5dcc49d37f1a4fef1d7d0a1098bd7b48e8550e71baf5f8f279cb54dc7c3b3c4d18967482debec585470