Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 10:42
Static task
static1
Behavioral task
behavioral1
Sample
180752c30cb36ad2320cdb74e36fb5a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
180752c30cb36ad2320cdb74e36fb5a6.exe
Resource
win10v2004-20231222-en
General
-
Target
180752c30cb36ad2320cdb74e36fb5a6.exe
-
Size
599KB
-
MD5
180752c30cb36ad2320cdb74e36fb5a6
-
SHA1
cdbc44d5365f4abaf6d093d6e78185370565f8a2
-
SHA256
342115e2b3702673e9f1baf63f0d801598b525b66388fd6af88a1a4666228482
-
SHA512
d2d653831e7c1c6eb054e9458e30a1635084dc32c996a52c745d959cf91b9e4813888e900c31adf4809dfc365560a47efde54c16a54cdb234abd447afdaa5d84
-
SSDEEP
6144:qX5Pj+glJePs7bnFto5+y4pAiKZ8MM8+3O:APj+gfKkbu+p6PZL+e
Malware Config
Extracted
azorult
http://outreach.zone/young/32/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
180752c30cb36ad2320cdb74e36fb5a6.exedescription pid process target process PID 2448 set thread context of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
180752c30cb36ad2320cdb74e36fb5a6.exepid process 2448 180752c30cb36ad2320cdb74e36fb5a6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
180752c30cb36ad2320cdb74e36fb5a6.exedescription pid process target process PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe PID 2448 wrote to memory of 2420 2448 180752c30cb36ad2320cdb74e36fb5a6.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\180752c30cb36ad2320cdb74e36fb5a6.exe"C:\Users\Admin\AppData\Local\Temp\180752c30cb36ad2320cdb74e36fb5a6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2420
-