Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
8db1f85b0d925bc29fa39ab117d9e8e3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8db1f85b0d925bc29fa39ab117d9e8e3.exe
Resource
win10v2004-20231215-en
General
-
Target
8db1f85b0d925bc29fa39ab117d9e8e3.exe
-
Size
800KB
-
MD5
8db1f85b0d925bc29fa39ab117d9e8e3
-
SHA1
ef8401758ac1bfc239a815e9bd9cf09bff47952e
-
SHA256
3578564ffbd467437aa9ea726f2907ad19d2242575b6219eee7bc1ef9e9b791e
-
SHA512
6cc4d5a8bb240be2a0eef23dcd75e4a990e97731491fe185be7e6ee7e440699360469a6f65aa03f38cec3239dfa64f2fdbd1415f917691236b247a53b74515cc
-
SSDEEP
12288:GOeADc9F3nC0Py3gAhJ+DNZEB6lPDnz+XvmJczxM584Vx8T7jNNYx554Sq5t3j:MNDvEurJc7Nuz54t3j
Malware Config
Extracted
azorult
http://193.247.144.18/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8db1f85b0d925bc29fa39ab117d9e8e3.exedescription pid process target process PID 3060 set thread context of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
8db1f85b0d925bc29fa39ab117d9e8e3.exedescription pid process target process PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe PID 3060 wrote to memory of 2728 3060 8db1f85b0d925bc29fa39ab117d9e8e3.exe 8db1f85b0d925bc29fa39ab117d9e8e3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8db1f85b0d925bc29fa39ab117d9e8e3.exe"C:\Users\Admin\AppData\Local\Temp\8db1f85b0d925bc29fa39ab117d9e8e3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\8db1f85b0d925bc29fa39ab117d9e8e3.exe"C:\Users\Admin\AppData\Local\Temp\8db1f85b0d925bc29fa39ab117d9e8e3.exe"2⤵PID:2728