Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe
Resource
win10v2004-20220812-en
General
-
Target
103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe
-
Size
27KB
-
MD5
bca39edfb3a7f17029fe0e8ef43e4fbb
-
SHA1
ee46250e7917afa4b0a3e0f5215289e247abd3f4
-
SHA256
03246d26bd30eb400f8a5a713c68f4c1be839b65fbabcc6c270f65d3319da987
-
SHA512
832c8382bbd74391e79711e24bf27c007890ae19357a8891bf45d419f9f1e9b5a5897c869cc1086c99089ae77f195759e1aa5170897c83ff30d208efa9249437
-
SSDEEP
384:yiJDnUyx8kUiGyLeij44+jCXsw+cPgqy8bvmQf8ZpHzGovUJAYkAYMjZB:9JDTx4kj49s+pTMv7iRPPRMNB
Malware Config
Extracted
azorult
http://huzcihna.shop/PL341/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exedescription pid process target process PID 2156 set thread context of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exedescription pid process Token: SeDebugPrivilege 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exedescription pid process target process PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe PID 2156 wrote to memory of 4228 2156 103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe Caspol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe"C:\Users\Admin\AppData\Local\Temp\103.156.91.153_-_googlespace_-_vbc.exe___bca39edfb3a7f17029fe0e8ef43e4fbb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2156-132-0x0000000000E60000-0x0000000000E6A000-memory.dmpFilesize
40KB
-
memory/4228-133-0x0000000000000000-mapping.dmp
-
memory/4228-134-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4228-136-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4228-137-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4228-138-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB