Analysis

  • max time kernel
    82s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2022 16:04

General

  • Target

    5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe

  • Size

    1.1MB

  • MD5

    65155eda022fd171ab983097f2bbe924

  • SHA1

    687d17dccfa13cb5534c1f6729e28cde6e03bcb8

  • SHA256

    5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570

  • SHA512

    dd6b0bc869d09287ca662e30569c70f09ddd21e26f239fe06c6ee6e8ccdf0c9842c6206476bf4c1d1b1a0a1f11d11fda90c585a9ab6fa9db12e04135a13939ea

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe
    "C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe
      "C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe"
      2⤵
        PID:1668

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1420-54-0x0000000075591000-0x0000000075593000-memory.dmp

      Filesize

      8KB

    • memory/1668-55-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-56-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-58-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-59-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-60-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-62-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-63-0x000000000041A1F8-mapping.dmp

    • memory/1668-65-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-67-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1668-68-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB