Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2023 06:13
Static task
static1
Behavioral task
behavioral1
Sample
b6149f93bfd5965f6619a10b002baaeb.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b6149f93bfd5965f6619a10b002baaeb.exe
Resource
win10v2004-20230703-en
General
-
Target
b6149f93bfd5965f6619a10b002baaeb.exe
-
Size
552KB
-
MD5
b6149f93bfd5965f6619a10b002baaeb
-
SHA1
c587df9d164c59c775d8f05aa5988e5fa2538495
-
SHA256
afc97428348462bec3f5f1a55ff3a39dd7b8c49bad76b784024ad2476ba43172
-
SHA512
2e95f74b42e789201b73ecb501b25a14b1980a6a745ad471f85e0934bf5077c994ea9bef5fd97653e7bc85a978664b38dac832ec345ec125c79b76a25c057e03
-
SSDEEP
12288:mYY4WeImE8C2Gu+6WGR9xPhFi2GGQDdJL:mYYn1zu+KXnHQ5d
Malware Config
Extracted
azorult
http://csbo1.shop/MSB01/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL 1 IoCs
pid Process 3680 b6149f93bfd5965f6619a10b002baaeb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3680 set thread context of 1660 3680 b6149f93bfd5965f6619a10b002baaeb.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3680 b6149f93bfd5965f6619a10b002baaeb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3680 wrote to memory of 1660 3680 b6149f93bfd5965f6619a10b002baaeb.exe 81 PID 3680 wrote to memory of 1660 3680 b6149f93bfd5965f6619a10b002baaeb.exe 81 PID 3680 wrote to memory of 1660 3680 b6149f93bfd5965f6619a10b002baaeb.exe 81 PID 3680 wrote to memory of 1660 3680 b6149f93bfd5965f6619a10b002baaeb.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6149f93bfd5965f6619a10b002baaeb.exe"C:\Users\Admin\AppData\Local\Temp\b6149f93bfd5965f6619a10b002baaeb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\b6149f93bfd5965f6619a10b002baaeb.exe"C:\Users\Admin\AppData\Local\Temp\b6149f93bfd5965f6619a10b002baaeb.exe"2⤵PID:1660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5f4f56e0ba9d427cf15c143b100152942
SHA12bf4e76d2f39db26673c1622dac3a6018866cc0c
SHA256dcc374e929e1c55580d8baf09dc63e1970714958b22e733d8faf2d11e4acdda7
SHA512489a5fa090d5186c6305b8b5197b7aa917ab68ef4d971d736486f5051ef3e6cf37970e7f8a7d7e83f89b1937d6affd9c655e623d5421b59eda24c1bac552d6ea