Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
9192c2363847689ba2d28c05c4c04c6c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9192c2363847689ba2d28c05c4c04c6c.exe
Resource
win10v2004-20231222-en
General
-
Target
9192c2363847689ba2d28c05c4c04c6c.exe
-
Size
684KB
-
MD5
9192c2363847689ba2d28c05c4c04c6c
-
SHA1
b3f174d14b24967a0d95b293731ec013d9831e91
-
SHA256
fb64982d0bee9d86ecd9ddca94b51091f146f2c77ac622c4b4c9908080ed7324
-
SHA512
866aa56306feb9b12f2dc82a33931f79fa1bdb742ad868a8bc02358bd9a04cb1e32ced13eb028469d94fc0f8d314b31f82bfc9e2a5094dafe3fe2e48f90fe90f
-
SSDEEP
6144:QaW9qkTX/Q6SZ70111uX5KNYGo0KyDsZuRczFcut7BKzFCY1A/QrmsblRZQT2cV:QaW9qMX/TzuXCzXDUO8ptgzMYTmsbHU
Malware Config
Extracted
azorult
http://37.0.10.102/rut/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9192c2363847689ba2d28c05c4c04c6c.exedescription pid process target process PID 1332 set thread context of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1624 4932 WerFault.exe 9192c2363847689ba2d28c05c4c04c6c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9192c2363847689ba2d28c05c4c04c6c.exepid process 1332 9192c2363847689ba2d28c05c4c04c6c.exe 1332 9192c2363847689ba2d28c05c4c04c6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9192c2363847689ba2d28c05c4c04c6c.exedescription pid process Token: SeDebugPrivilege 1332 9192c2363847689ba2d28c05c4c04c6c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9192c2363847689ba2d28c05c4c04c6c.exedescription pid process target process PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe PID 1332 wrote to memory of 4932 1332 9192c2363847689ba2d28c05c4c04c6c.exe 9192c2363847689ba2d28c05c4c04c6c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9192c2363847689ba2d28c05c4c04c6c.exe"C:\Users\Admin\AppData\Local\Temp\9192c2363847689ba2d28c05c4c04c6c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\9192c2363847689ba2d28c05c4c04c6c.exe"C:\Users\Admin\AppData\Local\Temp\9192c2363847689ba2d28c05c4c04c6c.exe"2⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 3643⤵
- Program crash
PID:1624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4932 -ip 49321⤵PID:2384