Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2022 16:04

General

  • Target

    5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe

  • Size

    1.1MB

  • MD5

    65155eda022fd171ab983097f2bbe924

  • SHA1

    687d17dccfa13cb5534c1f6729e28cde6e03bcb8

  • SHA256

    5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570

  • SHA512

    dd6b0bc869d09287ca662e30569c70f09ddd21e26f239fe06c6ee6e8ccdf0c9842c6206476bf4c1d1b1a0a1f11d11fda90c585a9ab6fa9db12e04135a13939ea

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe
    "C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe
      "C:\Users\Admin\AppData\Local\Temp\5bf6aa06e097882d54af8a0c43646e1d41379a1ffea8e1db8c6a580d9631f570.exe"
      2⤵
        PID:3492

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3492-130-0x0000000000000000-mapping.dmp

    • memory/3492-131-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3492-133-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3492-134-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/3492-135-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB