Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 05:32
Static task
static1
Behavioral task
behavioral1
Sample
5cb6df0b6eebbf70c7a86eb602175f2a753d52fcbf4eaba84d50a9c2db053eed.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5cb6df0b6eebbf70c7a86eb602175f2a753d52fcbf4eaba84d50a9c2db053eed.exe
Resource
win10v2004-20220722-en
General
-
Target
5cb6df0b6eebbf70c7a86eb602175f2a753d52fcbf4eaba84d50a9c2db053eed.exe
-
Size
283KB
-
MD5
a74a4396370e85da61252648d7f58a67
-
SHA1
c1074d8441726523bde755fe91bf9d19616d9942
-
SHA256
5cb6df0b6eebbf70c7a86eb602175f2a753d52fcbf4eaba84d50a9c2db053eed
-
SHA512
b6e81b54abf88f5b712f0c3523c7214810ab713877c960635e20d6401c2a9446c9096e5653d243ffc35e7c67bf34e4479aee4c422b84eb5c41b835476eec121d
Malware Config
Extracted
azorult
http://nomorez.ac.ug/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4660 2780 WerFault.exe 5cb6df0b6eebbf70c7a86eb602175f2a753d52fcbf4eaba84d50a9c2db053eed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cb6df0b6eebbf70c7a86eb602175f2a753d52fcbf4eaba84d50a9c2db053eed.exe"C:\Users\Admin\AppData\Local\Temp\5cb6df0b6eebbf70c7a86eb602175f2a753d52fcbf4eaba84d50a9c2db053eed.exe"1⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 13842⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2780 -ip 27801⤵PID:1904