Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 06:39
Static task
static1
Behavioral task
behavioral1
Sample
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe
Resource
win10v2004-20220721-en
General
-
Target
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe
-
Size
787KB
-
MD5
c952cfb9862d58fde136954569e1a972
-
SHA1
5819ab482ec5bb0a077617e262bc9bf100294830
-
SHA256
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
-
SHA512
f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e
Malware Config
Extracted
azorult
http://uzoma.ru/db2/3.3/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 3 IoCs
Processes:
sdhbhjsdhsd.exesdhbhjsdhsd.exesdhbhjsdhsd.exepid process 1652 sdhbhjsdhsd.exe 572 sdhbhjsdhsd.exe 2008 sdhbhjsdhsd.exe -
Deletes itself 1 IoCs
Processes:
sdhbhjsdhsd.exepid process 1652 sdhbhjsdhsd.exe -
Loads dropped DLL 3 IoCs
Processes:
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exepid process 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sdhbhjsdhsd.exedescription pid process target process PID 572 set thread context of 2008 572 sdhbhjsdhsd.exe sdhbhjsdhsd.exe -
NTFS ADS 1 IoCs
Processes:
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe:ZoneIdentifier 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exesdhbhjsdhsd.exesdhbhjsdhsd.exepid process 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe 572 sdhbhjsdhsd.exe 1652 sdhbhjsdhsd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
sdhbhjsdhsd.exepid process 572 sdhbhjsdhsd.exe 572 sdhbhjsdhsd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exesdhbhjsdhsd.exedescription pid process target process PID 1668 wrote to memory of 1652 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 1668 wrote to memory of 1652 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 1668 wrote to memory of 1652 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 1668 wrote to memory of 1652 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 1668 wrote to memory of 572 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 1668 wrote to memory of 572 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 1668 wrote to memory of 572 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 1668 wrote to memory of 572 1668 61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe sdhbhjsdhsd.exe PID 572 wrote to memory of 2008 572 sdhbhjsdhsd.exe sdhbhjsdhsd.exe PID 572 wrote to memory of 2008 572 sdhbhjsdhsd.exe sdhbhjsdhsd.exe PID 572 wrote to memory of 2008 572 sdhbhjsdhsd.exe sdhbhjsdhsd.exe PID 572 wrote to memory of 2008 572 sdhbhjsdhsd.exe sdhbhjsdhsd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe"C:\Users\Admin\AppData\Local\Temp\61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe" 1 "C:\Users\Admin\AppData\Local\Temp\61305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5.exe" 6C63272⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"C:\Users\Admin\AppData\Roaming\dndnks\sdhbhjsdhsd.exe"3⤵
- Executes dropped EXE
PID:2008
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD5c952cfb9862d58fde136954569e1a972
SHA15819ab482ec5bb0a077617e262bc9bf100294830
SHA25661305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
SHA512f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e
-
Filesize
787KB
MD5c952cfb9862d58fde136954569e1a972
SHA15819ab482ec5bb0a077617e262bc9bf100294830
SHA25661305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
SHA512f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e
-
Filesize
787KB
MD5c952cfb9862d58fde136954569e1a972
SHA15819ab482ec5bb0a077617e262bc9bf100294830
SHA25661305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
SHA512f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e
-
Filesize
787KB
MD5c952cfb9862d58fde136954569e1a972
SHA15819ab482ec5bb0a077617e262bc9bf100294830
SHA25661305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
SHA512f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e
-
Filesize
787KB
MD5c952cfb9862d58fde136954569e1a972
SHA15819ab482ec5bb0a077617e262bc9bf100294830
SHA25661305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
SHA512f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e
-
Filesize
787KB
MD5c952cfb9862d58fde136954569e1a972
SHA15819ab482ec5bb0a077617e262bc9bf100294830
SHA25661305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
SHA512f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e
-
Filesize
787KB
MD5c952cfb9862d58fde136954569e1a972
SHA15819ab482ec5bb0a077617e262bc9bf100294830
SHA25661305e9bf5a8551a94b407e579797b590b5c8ea1e78a3936f2dbc76dacfe32a5
SHA512f480d4f7c01fe34d194b3d3f1f67b69e8d738bd3f1e99a742280f561807e386a4bd9ceed08c926250c27e3e22c1494ef3c416458a05ed25119189c4307af1b0e