Overview
overview
10Static
static
101.exe
windows7-x64
31221.exe
windows7-x64
106b282d34fv2.exe
windows7-x64
1B000CEF.exe
windows7-x64
10Builder.exe
windows7-x64
1POVOFJYqCo...Iu.exe
windows7-x64
1Terracotta.exe
windows7-x64
1TerracottaGUI.exe
windows7-x64
1Zver.exe
windows7-x64
3a.exe
windows7-x64
10amdcontroller.exe
windows7-x64
10bg.exe
windows7-x64
1bin.exe
windows7-x64
10bin2.exe
windows7-x64
7ej.exe
windows7-x64
10fban4.exe
windows7-x64
7glash.exe
windows7-x64
1johngotovo (2).exe
windows7-x64
10johngotovo...al.exe
windows7-x64
10ktg.exe
windows7-x64
1otIXAOPqOV...LX.exe
windows7-x64
3scvsots.exe
windows7-x64
10setup.exe
windows7-x64
1shit.exe
windows7-x64
10ss.exe
windows7-x64
10stealedd517v2.exe
windows7-x64
1steel.exe
windows7-x64
1ted.exe
windows7-x64
1update_b.exe
windows7-x64
1update_z.exe
windows7-x64
1uyo.exe
windows7-x64
1v72d8z2.exe
windows7-x64
1Analysis
-
max time kernel
17s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13-08-2023 18:33
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1221.exe
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
6b282d34fv2.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
B000CEF.exe
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
Builder.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
POVOFJYqCoZfOoPkWOsSBcVYWIu.exe
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
Terracotta.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
TerracottaGUI.exe
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
Zver.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
a.exe
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
amdcontroller.exe
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
bg.exe
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
bin.exe
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
bin2.exe
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
ej.exe
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
fban4.exe
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
glash.exe
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
johngotovo (2).exe
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
johngotovo (2)_original_original.exe
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
ktg.exe
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
otIXAOPqOVgvIKePlwFQLX.exe
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
scvsots.exe
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
setup.exe
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
shit.exe
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
ss.exe
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
stealedd517v2.exe
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
steel.exe
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
ted.exe
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
update_b.exe
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
update_z.exe
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
uyo.exe
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
v72d8z2.exe
Resource
win7-20230712-en
General
-
Target
johngotovo (2).exe
-
Size
2.6MB
-
MD5
65b91f22c0d3b69a245c374ebdb6d041
-
SHA1
88a51a6128202ee53e2f0ebcc3a6ff33dea9c3fc
-
SHA256
d0f6ed2e665841e4655437c0e83ab5b8ab9d83c4c8ca5367a6f6a7afca204d3e
-
SHA512
8eff45e564ad90755fe1d1b1348e5b184afe109612403461d46a65a90398beb20f3d404e24c3f900841e108b6a85d22bdb7cadd4db71245f3e91d9f76c95c979
-
SSDEEP
49152:pcNRa+mO3X9Qp7ZysBDVPdiw8fM96HOOP2qxuqGSJ+1lInYq6rpyxyD5nrnVvXzD:pcSg967ZHrxV96HV/fGS0IpIDtJXzdSe
Malware Config
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
johngotovo (2).exedescription pid process Token: 33 2372 johngotovo (2).exe Token: SeIncBasePriorityPrivilege 2372 johngotovo (2).exe Token: 33 2372 johngotovo (2).exe Token: SeIncBasePriorityPrivilege 2372 johngotovo (2).exe Token: 33 2372 johngotovo (2).exe Token: SeIncBasePriorityPrivilege 2372 johngotovo (2).exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
johngotovo (2).exepid process 2372 johngotovo (2).exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Turbo.net\Sandbox\GOVNO\8.4.1.1\xsandbox.binFilesize
16B
MD5ec3d19e8e9b05d025cb56c2a98ead8e7
SHA1748532edeb86496c8efe5e2327501d89ec1f13df
SHA256edb7be3ef6098a1e24d0c72bbc6f968dea773951a0dd07b63bad6d9009ae3bf4
SHA512175fb8432472b6795bb5db0eba61bc7b57331720825df5b048f3086815ba844df4f7e83e42ff9e8fe5ab01700675a774cb916677953d6e0088ffbf1fa2775349
-
memory/2372-96-0x000000007EFDF000-0x000000007EFE0000-memory.dmpFilesize
4KB
-
memory/2372-62-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-57-0x0000000077510000-0x0000000077620000-memory.dmpFilesize
1.1MB
-
memory/2372-54-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-63-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-64-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-65-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-68-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-67-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-66-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-69-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-71-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-77-0x0000000010000000-0x000000001006A000-memory.dmpFilesize
424KB
-
memory/2372-72-0x0000000010000000-0x000000001006A000-memory.dmpFilesize
424KB
-
memory/2372-80-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2372-95-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2372-83-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2372-87-0x00000000005E0000-0x0000000000925000-memory.dmpFilesize
3.3MB
-
memory/2372-93-0x0000000010000000-0x000000001006A000-memory.dmpFilesize
424KB
-
memory/2372-91-0x0000000000E70000-0x0000000000EB0000-memory.dmpFilesize
256KB
-
memory/2372-121-0x0000000077510000-0x0000000077620000-memory.dmpFilesize
1.1MB
-
memory/2372-55-0x0000000077A40000-0x0000000077A41000-memory.dmpFilesize
4KB
-
memory/2372-84-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/2372-97-0x0000000010000000-0x000000001006A000-memory.dmpFilesize
424KB
-
memory/2372-98-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2372-102-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2372-103-0x0000000077510000-0x0000000077620000-memory.dmpFilesize
1.1MB
-
memory/2372-104-0x0000000002D50000-0x0000000002E50000-memory.dmpFilesize
1024KB
-
memory/2372-105-0x0000000010000000-0x000000001006A000-memory.dmpFilesize
424KB
-
memory/2372-106-0x0000000002CD0000-0x0000000002CE0000-memory.dmpFilesize
64KB
-
memory/2372-107-0x0000000003560000-0x0000000003660000-memory.dmpFilesize
1024KB
-
memory/2372-108-0x0000000002FE0000-0x00000000030E0000-memory.dmpFilesize
1024KB
-
memory/2372-110-0x0000000002FA0000-0x0000000002FB0000-memory.dmpFilesize
64KB
-
memory/2372-109-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2372-111-0x0000000003660000-0x0000000003760000-memory.dmpFilesize
1024KB
-
memory/2372-112-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB
-
memory/2372-113-0x0000000077A40000-0x0000000077A41000-memory.dmpFilesize
4KB
-
memory/2372-114-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2372-115-0x0000000077510000-0x0000000077620000-memory.dmpFilesize
1.1MB
-
memory/2372-56-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2372-119-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2372-94-0x000000007EFDB000-0x000000007EFDE000-memory.dmpFilesize
12KB
-
memory/2372-122-0x0000000000930000-0x0000000000C7A000-memory.dmpFilesize
3.3MB