Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
80784f4118d7c4d54dd555436fbd5213.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
80784f4118d7c4d54dd555436fbd5213.exe
Resource
win10v2004-20231222-en
General
-
Target
80784f4118d7c4d54dd555436fbd5213.exe
-
Size
242KB
-
MD5
80784f4118d7c4d54dd555436fbd5213
-
SHA1
dd0a5e46cbd2daa4088ec0185a9f1ba238fe4ba8
-
SHA256
390724bb7df37d40b8028f27ee101903256f930df0795fe88b9f7a4ddd6a46d1
-
SHA512
0015ca19963813aab9b47207c787bab0efbcfb909c28fa915c264431f84fe8b649fdc771fdc0fc68835fc79c750911d3f92c4746049a47044cff13932c210b8e
-
SSDEEP
6144:42ASK7jM2Aqye3575wB/WarzFWIgc7zCw:Ov7L6a5+BXzFWHw
Malware Config
Extracted
azorult
http://systemwebanalytycs.com/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4988 5104 WerFault.exe 80784f4118d7c4d54dd555436fbd5213.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80784f4118d7c4d54dd555436fbd5213.exe"C:\Users\Admin\AppData\Local\Temp\80784f4118d7c4d54dd555436fbd5213.exe"1⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 13842⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5104 -ip 51041⤵PID:3396