Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
8925082557F9FF4E72F7DC0BD2EE0C9C.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8925082557F9FF4E72F7DC0BD2EE0C9C.exe
Resource
win10v2004-20231222-en
General
-
Target
8925082557F9FF4E72F7DC0BD2EE0C9C.exe
-
Size
876KB
-
MD5
8925082557f9ff4e72f7dc0bd2ee0c9c
-
SHA1
056d1a930e31e5ce58d836b827d203d9fe60af2a
-
SHA256
8e717d95d5e1039d3effeebbc38bf00facd5ced07e9c40c5c37b32a11026d0c4
-
SHA512
7a807cb16f029ee13e5bef886bbdaaff343ffb7e9def24e6a5b053d2235719cefaf6aa742d2af5d9200cbc3407cc445a0e12f08c63f62dff73bc25b06cd2493e
-
SSDEEP
12288:5XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXV:8sGRdrEAbm4zesGRdrEAbm4zMX06eyM
Malware Config
Extracted
azorult
http://cafirepacks.com/pub/fon/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exedescription pid process target process PID 1436 set thread context of 2464 1436 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exepid process 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 2464 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exepid process 1436 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 2472 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exepid process 1436 8925082557F9FF4E72F7DC0BD2EE0C9C.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8925082557F9FF4E72F7DC0BD2EE0C9C.exedescription pid process target process PID 1436 wrote to memory of 2464 1436 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe PID 1436 wrote to memory of 2464 1436 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe PID 1436 wrote to memory of 2464 1436 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe PID 1436 wrote to memory of 2464 1436 8925082557F9FF4E72F7DC0BD2EE0C9C.exe 8925082557F9FF4E72F7DC0BD2EE0C9C.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"C:\Users\Admin\AppData\Local\Temp\8925082557F9FF4E72F7DC0BD2EE0C9C.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3204
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472