Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:56
Static task
static1
Behavioral task
behavioral1
Sample
20c677bfe746ef21cb647ec197118313.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20c677bfe746ef21cb647ec197118313.exe
Resource
win10v2004-20231215-en
General
-
Target
20c677bfe746ef21cb647ec197118313.exe
-
Size
500KB
-
MD5
20c677bfe746ef21cb647ec197118313
-
SHA1
579f6027d4f2d2d26d0a66080b60f00069aad5a0
-
SHA256
3a202ee1deaeda21a66a8de098965cdbd111b3a53c9ab85be0d282d9464c96c1
-
SHA512
c5a276d717c19563a0391d3aa0d7d084334126b3bb9aae95fecacd1b0fa340060ce182b417120e82d92abd0c84f4cf51e94806a4443bc6ca6ecf77ea33c3e4a0
-
SSDEEP
12288:9caIS4qCQ/s50L2ArSmPoPdAttEOpmysMkPQadTPxywtP:A7zXA2ArfPoP0tEOjsLPQuyC
Malware Config
Extracted
azorult
http://petcf.com/az/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
20c677bfe746ef21cb647ec197118313.exedescription pid process target process PID 2536 set thread context of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
20c677bfe746ef21cb647ec197118313.exepid process 2536 20c677bfe746ef21cb647ec197118313.exe 2536 20c677bfe746ef21cb647ec197118313.exe 2536 20c677bfe746ef21cb647ec197118313.exe 2536 20c677bfe746ef21cb647ec197118313.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
20c677bfe746ef21cb647ec197118313.exedescription pid process Token: SeDebugPrivilege 2536 20c677bfe746ef21cb647ec197118313.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
20c677bfe746ef21cb647ec197118313.exedescription pid process target process PID 2536 wrote to memory of 2584 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2584 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2584 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2584 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2592 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2592 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2592 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2592 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe PID 2536 wrote to memory of 2616 2536 20c677bfe746ef21cb647ec197118313.exe 20c677bfe746ef21cb647ec197118313.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"2⤵PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"2⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"C:\Users\Admin\AppData\Local\Temp\20c677bfe746ef21cb647ec197118313.exe"2⤵PID:2616
-