Analysis
-
max time kernel
92s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 07:03
Static task
static1
Behavioral task
behavioral1
Sample
ad7817be4e1f4a6b29eedb318a6963cfcdf1f844b05f94b14ed4be2b83faabea.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
ad7817be4e1f4a6b29eedb318a6963cfcdf1f844b05f94b14ed4be2b83faabea.exe
Resource
win10v2004-20220721-en
General
-
Target
ad7817be4e1f4a6b29eedb318a6963cfcdf1f844b05f94b14ed4be2b83faabea.exe
-
Size
274KB
-
MD5
e5760c6a41a442d80369a7ce80a56000
-
SHA1
783e0d2a39bec3f5ad557a221e8ef77c9d02cbd5
-
SHA256
ad7817be4e1f4a6b29eedb318a6963cfcdf1f844b05f94b14ed4be2b83faabea
-
SHA512
281181c3d164177f9da29d8d13782b72b91675be2cd058154e8febc402abc5515c66a81b198cf5663e92d9e5eaa7a75e6c87b452a518941e403292dac9ba43b7
Malware Config
Extracted
azorult
http://gersopakoftaronka.xyz/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2232 1340 WerFault.exe ad7817be4e1f4a6b29eedb318a6963cfcdf1f844b05f94b14ed4be2b83faabea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad7817be4e1f4a6b29eedb318a6963cfcdf1f844b05f94b14ed4be2b83faabea.exe"C:\Users\Admin\AppData\Local\Temp\ad7817be4e1f4a6b29eedb318a6963cfcdf1f844b05f94b14ed4be2b83faabea.exe"1⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 7282⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1340 -ip 13401⤵PID:4792