Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20-01-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
8925082557F9FF4E72F7DC0BD2EE0C9C.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8925082557F9FF4E72F7DC0BD2EE0C9C.exe
Resource
win10v2004-20231222-en
General
-
Target
8925082557F9FF4E72F7DC0BD2EE0C9C.exe
-
Size
876KB
-
MD5
8925082557f9ff4e72f7dc0bd2ee0c9c
-
SHA1
056d1a930e31e5ce58d836b827d203d9fe60af2a
-
SHA256
8e717d95d5e1039d3effeebbc38bf00facd5ced07e9c40c5c37b32a11026d0c4
-
SHA512
7a807cb16f029ee13e5bef886bbdaaff343ffb7e9def24e6a5b053d2235719cefaf6aa742d2af5d9200cbc3407cc445a0e12f08c63f62dff73bc25b06cd2493e
-
SSDEEP
12288:5XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXV:8sGRdrEAbm4zesGRdrEAbm4zMX06eyM
Malware Config
Extracted
azorult
http://cafirepacks.com/pub/fon/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exedescription pid process target process PID 1236 set thread context of 2624 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exepid process 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2624 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exepid process 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exepid process 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exedescription pid process target process PID 1236 wrote to memory of 2624 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe PID 1236 wrote to memory of 2624 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe PID 1236 wrote to memory of 2624 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe PID 1236 wrote to memory of 2624 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe PID 1236 wrote to memory of 2624 1236 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-