Analysis
-
max time kernel
96s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 08:32
Static task
static1
Behavioral task
behavioral1
Sample
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe
Resource
win10v2004-20220721-en
General
-
Target
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe
-
Size
607KB
-
MD5
b115061acd459a7cbfc6b12f85b16083
-
SHA1
6538ecd3b289457b6e61bcccba35a3bec4f04a17
-
SHA256
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509
-
SHA512
da1cbfc4f207616463fdc05ef9a860146cd2c983d42583d885252c080eb3c7b5cb5b64b101a29fc2c5d7a430e21aaadbda68fdd531ef70e2490e4a63fd55e0a2
Malware Config
Extracted
azorult
https://lapyo.de/edu/32/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exedescription pid process target process PID 3576 set thread context of 3528 3576 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exepid process 3576 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exedescription pid process target process PID 3576 wrote to memory of 3528 3576 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe PID 3576 wrote to memory of 3528 3576 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe PID 3576 wrote to memory of 3528 3576 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe PID 3576 wrote to memory of 3528 3576 f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe"C:\Users\Admin\AppData\Local\Temp\f75b569b54638ca8285237ca714e853e3d2ae9e390c4c9516caa04e9fcd30509.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵PID:3528
-