Analysis
-
max time kernel
222s -
max time network
246s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 00:54
Static task
static1
Behavioral task
behavioral1
Sample
NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe
Resource
win10v2004-20230915-en
General
-
Target
NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe
-
Size
389KB
-
MD5
62b4021de4dfbdfd7f7be8272cbfc2c7
-
SHA1
5060bb5bb232f2064b9bdcccacf99463248a9305
-
SHA256
7d866f33d86d517e58175b598f292c82bce331c511091472ea8249998cbe5b8c
-
SHA512
79fac5b4b8483a8d1b3d522ab396fd7ed7ef6f45a859f20e9d85804ae2e492f6202318f9f3800366f98278b093bcb9b993ddc8530e5cd0baffc0a7d1008b318e
-
SSDEEP
6144:iYa6HIhVJ9et8OgP+UQitXPDyzPtVg8612Q9J63z/6cS:iYRwFebgWU9tbyYX1t9J63b6t
Malware Config
Extracted
azorult
http://185.29.11.60/roth3/Panel/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
pid Process 3372 lxemyukmfl.exe 2752 lxemyukmfl.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3372 set thread context of 2752 3372 lxemyukmfl.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3372 lxemyukmfl.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3372 4928 NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe 89 PID 4928 wrote to memory of 3372 4928 NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe 89 PID 4928 wrote to memory of 3372 4928 NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe 89 PID 3372 wrote to memory of 2752 3372 lxemyukmfl.exe 90 PID 3372 wrote to memory of 2752 3372 lxemyukmfl.exe 90 PID 3372 wrote to memory of 2752 3372 lxemyukmfl.exe 90 PID 3372 wrote to memory of 2752 3372 lxemyukmfl.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe"C:\Users\Admin\AppData\Local\Temp\NDUSTRIAS ALGAMA, S.L. OFERTA 13092023338220_619_pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\lxemyukmfl.exe"C:\Users\Admin\AppData\Local\Temp\lxemyukmfl.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\lxemyukmfl.exe"C:\Users\Admin\AppData\Local\Temp\lxemyukmfl.exe"3⤵
- Executes dropped EXE
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5519f7ccde705b37f8106c1fa6da5c674
SHA1dbf81fd45511d2ee76c4b01cb714af1dfa2686a5
SHA256e0ca894ac3c86af132989856491a0d2429f4695f4a505760780a69a2400b0c65
SHA51291ff71073aad7824804434dfac6f7ae4804390e036bd4c16521f14ee6baa2a9b3eab3fad1c3954a1d8f3c578e2d028d23932d351be9a70401996a0f8f0d899ad
-
Filesize
164KB
MD5adbf55bf115a8450541d6ce07a4132f3
SHA1ca34cd2bd070070dc642e2af471aec27c38896dc
SHA2561134f96d07e5ee5206ffbacce888cb5abece3112f8cd0513b79753dd6543d9ad
SHA51278fc336fff322e722b5684892199a1906ee3077a6634e1d25d527f31d37291f547ba376d338786a4e4628f1801947bc7c332290a4fad8b308b97ed2b1fdbd7cc
-
Filesize
164KB
MD5adbf55bf115a8450541d6ce07a4132f3
SHA1ca34cd2bd070070dc642e2af471aec27c38896dc
SHA2561134f96d07e5ee5206ffbacce888cb5abece3112f8cd0513b79753dd6543d9ad
SHA51278fc336fff322e722b5684892199a1906ee3077a6634e1d25d527f31d37291f547ba376d338786a4e4628f1801947bc7c332290a4fad8b308b97ed2b1fdbd7cc
-
Filesize
164KB
MD5adbf55bf115a8450541d6ce07a4132f3
SHA1ca34cd2bd070070dc642e2af471aec27c38896dc
SHA2561134f96d07e5ee5206ffbacce888cb5abece3112f8cd0513b79753dd6543d9ad
SHA51278fc336fff322e722b5684892199a1906ee3077a6634e1d25d527f31d37291f547ba376d338786a4e4628f1801947bc7c332290a4fad8b308b97ed2b1fdbd7cc