Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 06:46
Static task
static1
Behavioral task
behavioral1
Sample
e9829606978e177950005ba2b44da32ee4be9ad27e91cc317f7add2fa8b13438.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
e9829606978e177950005ba2b44da32ee4be9ad27e91cc317f7add2fa8b13438.exe
Resource
win10v2004-20220722-en
General
-
Target
e9829606978e177950005ba2b44da32ee4be9ad27e91cc317f7add2fa8b13438.exe
-
Size
244KB
-
MD5
0e9f4420a3beb5894228824e8f7c3947
-
SHA1
eba1043129043cd719136ccfe8b63054628c0e1f
-
SHA256
e9829606978e177950005ba2b44da32ee4be9ad27e91cc317f7add2fa8b13438
-
SHA512
0e119b06ae94df6ef5d16a3e3bc67b847bf4f004621388aa15479b7dc9b9fdbd162200e341f55f414d61ab59a484f034b688d81abfd43a4b9c2fc1ac0dd45426
Malware Config
Extracted
azorult
http://tuscano.ug/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1664 4260 WerFault.exe e9829606978e177950005ba2b44da32ee4be9ad27e91cc317f7add2fa8b13438.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9829606978e177950005ba2b44da32ee4be9ad27e91cc317f7add2fa8b13438.exe"C:\Users\Admin\AppData\Local\Temp\e9829606978e177950005ba2b44da32ee4be9ad27e91cc317f7add2fa8b13438.exe"1⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 13882⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4260 -ip 42601⤵PID:4272