Analysis
-
max time kernel
240s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
Resource
win10v2004-20221111-en
General
-
Target
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
-
Size
555KB
-
MD5
ab2f8366fd92bf15a6e4ca35e6b44e53
-
SHA1
0acc34346605fadc146945df26cbcc6dfda7de3a
-
SHA256
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de
-
SHA512
061b58a20f8cad0a3fc199fcab2b87ef06c04d3904a39a6da3f1848682f43657bf8bb13f3b12fd303448f816ae2755c816f73d7d41af23562780ca636bdeb257
-
SSDEEP
12288:j2xPEGwlLRqZLkPK3Nd61Z1NelbzO/U0evoHvu1ST5W:uLuLIucN41Z1cY/AvoHkj
Malware Config
Extracted
azorult
http://50.116.23.203/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exedescription pid process target process PID 472 set thread context of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exepid process 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exedescription pid process Token: SeDebugPrivilege 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exedescription pid process target process PID 472 wrote to memory of 780 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 780 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 780 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 780 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1984 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1984 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1984 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1984 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 472 wrote to memory of 1788 472 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/472-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmpFilesize
8KB
-
memory/472-55-0x0000000074E40000-0x00000000753EB000-memory.dmpFilesize
5.7MB
-
memory/472-67-0x0000000074E40000-0x00000000753EB000-memory.dmpFilesize
5.7MB
-
memory/1788-57-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-59-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-60-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-61-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-63-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-64-0x000000000041A1F8-mapping.dmp
-
memory/1788-56-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-66-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-69-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1788-70-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB