Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2023, 09:52

General

  • Target

    8b92b038889be2da5c222872fb024d7a26c991415cb048373056518c491b19ee.exe

  • Size

    685KB

  • MD5

    8df71313dff890f4650214dfa0a7325f

  • SHA1

    cbc9674b5b99c5a0ccafeee429ad3f495ef914ee

  • SHA256

    8b92b038889be2da5c222872fb024d7a26c991415cb048373056518c491b19ee

  • SHA512

    f3672693b540c5a184d64dd094ee1422dcd3f693285cb549eeaf368142d0400974aca96568f65f72e96a2e86f91255e6def53f27533aa2fea296b6582d6aa010

  • SSDEEP

    12288:8yvJRBusyOgG00Fkon7epLV9nn13QxydyLXIpOB5+Z27+9p:PFud0FEfCSqXIe

Malware Config

Extracted

Family

azorult

C2

http://mchas.shop/PL341/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b92b038889be2da5c222872fb024d7a26c991415cb048373056518c491b19ee.exe
    "C:\Users\Admin\AppData\Local\Temp\8b92b038889be2da5c222872fb024d7a26c991415cb048373056518c491b19ee.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Users\Admin\AppData\Local\Temp\8b92b038889be2da5c222872fb024d7a26c991415cb048373056518c491b19ee.exe
      "C:\Users\Admin\AppData\Local\Temp\8b92b038889be2da5c222872fb024d7a26c991415cb048373056518c491b19ee.exe"
      2⤵
        PID:4244

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4184-139-0x0000000004FB0000-0x000000000504C000-memory.dmp

      Filesize

      624KB

    • memory/4184-147-0x00000000750D0000-0x0000000075880000-memory.dmp

      Filesize

      7.7MB

    • memory/4184-135-0x0000000005220000-0x00000000057C4000-memory.dmp

      Filesize

      5.6MB

    • memory/4184-136-0x0000000004D10000-0x0000000004DA2000-memory.dmp

      Filesize

      584KB

    • memory/4184-137-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/4184-138-0x0000000004EA0000-0x0000000004EAA000-memory.dmp

      Filesize

      40KB

    • memory/4184-141-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/4184-133-0x00000000750D0000-0x0000000075880000-memory.dmp

      Filesize

      7.7MB

    • memory/4184-134-0x0000000000240000-0x00000000002F2000-memory.dmp

      Filesize

      712KB

    • memory/4184-140-0x00000000750D0000-0x0000000075880000-memory.dmp

      Filesize

      7.7MB

    • memory/4244-145-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4244-146-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4244-142-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4244-148-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB