Analysis
-
max time kernel
182s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 15:42
Static task
static1
Behavioral task
behavioral1
Sample
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
Resource
win10v2004-20221111-en
General
-
Target
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
-
Size
555KB
-
MD5
ab2f8366fd92bf15a6e4ca35e6b44e53
-
SHA1
0acc34346605fadc146945df26cbcc6dfda7de3a
-
SHA256
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de
-
SHA512
061b58a20f8cad0a3fc199fcab2b87ef06c04d3904a39a6da3f1848682f43657bf8bb13f3b12fd303448f816ae2755c816f73d7d41af23562780ca636bdeb257
-
SSDEEP
12288:j2xPEGwlLRqZLkPK3Nd61Z1NelbzO/U0evoHvu1ST5W:uLuLIucN41Z1cY/AvoHkj
Malware Config
Extracted
azorult
http://50.116.23.203/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exedescription pid process target process PID 3192 set thread context of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exepid process 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exedescription pid process Token: SeDebugPrivilege 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exedescription pid process target process PID 3192 wrote to memory of 1684 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1684 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1684 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe PID 3192 wrote to memory of 1304 3192 c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c34a0f0cfca4f59cc5dbe7588bba82fdf79838593286a80eaad0033df31290de.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1304-135-0x0000000000000000-mapping.dmp
-
memory/1304-136-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1304-138-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1304-140-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1684-134-0x0000000000000000-mapping.dmp
-
memory/3192-132-0x0000000074650000-0x0000000074C01000-memory.dmpFilesize
5.7MB
-
memory/3192-133-0x0000000074650000-0x0000000074C01000-memory.dmpFilesize
5.7MB
-
memory/3192-139-0x0000000074650000-0x0000000074C01000-memory.dmpFilesize
5.7MB