Analysis
-
max time kernel
167s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 06:43
Behavioral task
behavioral1
Sample
f400384069cbed55c475ce3b853b320eb3e448d036f52aa814aa36a86c093012.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
f400384069cbed55c475ce3b853b320eb3e448d036f52aa814aa36a86c093012.exe
Resource
win10v2004-20220721-en
General
-
Target
f400384069cbed55c475ce3b853b320eb3e448d036f52aa814aa36a86c093012.exe
-
Size
120KB
-
MD5
225f251e1616db62c100c75e3b0bf84e
-
SHA1
51f4b77bc60218a199e21721b4315745d2cc4f36
-
SHA256
f400384069cbed55c475ce3b853b320eb3e448d036f52aa814aa36a86c093012
-
SHA512
9b45b92792af5b5b6e22693caf8b847e26afad806ef30f76c0b258bdbefd70caf8740dd23f6323a1aa8f1e3930b41184615e5bce2cc4a7ceff4d6ba74ad95b0c
Malware Config
Extracted
azorult
http://51.15.62.59/AED77D05-A028-477C-B013-04F33F1385C3/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Processes:
resource yara_rule behavioral2/memory/3296-130-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4772 3296 WerFault.exe f400384069cbed55c475ce3b853b320eb3e448d036f52aa814aa36a86c093012.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f400384069cbed55c475ce3b853b320eb3e448d036f52aa814aa36a86c093012.exe"C:\Users\Admin\AppData\Local\Temp\f400384069cbed55c475ce3b853b320eb3e448d036f52aa814aa36a86c093012.exe"1⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 12562⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3296 -ip 32961⤵PID:1212