Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 13:25

General

  • Target

    a3e56bd926b686267d164d3ded675759.exe

  • Size

    604KB

  • MD5

    a3e56bd926b686267d164d3ded675759

  • SHA1

    392a8deedfe6f6a7ac3e874b99ea531dabe473c6

  • SHA256

    c5d36d877e2a3cbc480e8840176cff740f0f07ed7a01230e9dc5f6612a9d121f

  • SHA512

    7b7f79601782123cadf9a0d22a122e022a25f40e317b6fa96446e5cedab400fa1ac1eabdad58019214ecbaf62d88938e23fcbdd1d677e5a5ac21f4f8b211452f

  • SSDEEP

    12288:Y1qHWUYzw0jASg7Ddki7tWZoLoSMMkmm3fngcnuy97HGeGtETjk:YAHWUY9zsV7Q+LHQTgGjGLMk

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3e56bd926b686267d164d3ded675759.exe
    "C:\Users\Admin\AppData\Local\Temp\a3e56bd926b686267d164d3ded675759.exe"
    1⤵
      PID:1284

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1284-0-0x0000000000050000-0x0000000000057000-memory.dmp
      Filesize

      28KB

    • memory/1284-1-0x0000000000180000-0x0000000000181000-memory.dmp
      Filesize

      4KB

    • memory/1284-2-0x0000000000050000-0x0000000000057000-memory.dmp
      Filesize

      28KB

    • memory/1284-3-0x0000000000400000-0x0000000000499000-memory.dmp
      Filesize

      612KB

    • memory/1284-4-0x0000000000180000-0x0000000000181000-memory.dmp
      Filesize

      4KB

    • memory/1284-5-0x0000000000400000-0x0000000000499000-memory.dmp
      Filesize

      612KB

    • memory/1284-6-0x0000000000050000-0x0000000000057000-memory.dmp
      Filesize

      28KB