Analysis
-
max time kernel
43s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 08:32
Static task
static1
Behavioral task
behavioral1
Sample
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe
Resource
win10v2004-20220721-en
General
-
Target
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe
-
Size
607KB
-
MD5
b115061acd459a7cbfc6b12f85b16083
-
SHA1
6538ecd3b289457b6e61bcccba35a3bec4f04a17
-
SHA256
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509
-
SHA512
da1cbfc4f207616463fdc05ef9a860146cd2c983d42583d885252c080eb3c7b5cb5b64b101a29fc2c5d7a430e21aaadbda68fdd531ef70e2490e4a63fd55e0a2
Malware Config
Extracted
azorult
https://lapyo.de/edu/32/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1992-56-0x0000000000510000-0x0000000000560000-memory.dmp agile_net -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exedescription pid process target process PID 1992 set thread context of 832 1992 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exepid process 1992 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exedescription pid process target process PID 1992 wrote to memory of 832 1992 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe PID 1992 wrote to memory of 832 1992 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe PID 1992 wrote to memory of 832 1992 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe PID 1992 wrote to memory of 832 1992 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe PID 1992 wrote to memory of 832 1992 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe"C:\Users\Admin\AppData\Local\Temp\f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:832
-