Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2022 15:47
Behavioral task
behavioral1
Sample
3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe
Resource
win10v2004-20220812-en
General
-
Target
3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe
-
Size
175KB
-
MD5
50b36e2de3cf22837071a3fefc0f3e80
-
SHA1
fea8f62c713cf8fbfb443cd30a01d666ac4102a8
-
SHA256
3f1923db62f333e5507d181991dd82589b2f4cef8a28e3864e0211b01891fc4b
-
SHA512
c41c518d2b052a541b386e3516a468b3b942d9a40b38f46d75ad3bd15be0a2e58ff04df47316af918817f87c8624117bb807a2b1b8539cc3d210f19718e2e6dc
-
SSDEEP
3072:X1eCtE66MAEqpTOp8CRmByOfhrqK9ll8GeHXlYTayj81Ao/JWFfJIm:XclNpjCR4fQK9ll8bH1jyjWAo/J+fx
Malware Config
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Processes:
resource yara_rule behavioral2/memory/4380-132-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4776 4380 WerFault.exe 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exedescription pid process Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe Token: SeSecurityPrivilege 4380 3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe"C:\Users\Admin\AppData\Local\Temp\3F1923DB62F333E5507D181991DD82589B2F4CEF8A28E.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 9882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4380 -ip 43801⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4380-132-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4380-133-0x0000000000583000-0x0000000000594000-memory.dmpFilesize
68KB
-
memory/4380-134-0x0000000000583000-0x0000000000594000-memory.dmpFilesize
68KB
-
memory/4380-135-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/4380-136-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB