Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
d0457978ba4ccb7acc9de302ac977aec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d0457978ba4ccb7acc9de302ac977aec.exe
Resource
win10v2004-20240226-en
General
-
Target
d0457978ba4ccb7acc9de302ac977aec.exe
-
Size
422KB
-
MD5
d0457978ba4ccb7acc9de302ac977aec
-
SHA1
808f09f895d5bf0ec68f7729640e29cfe9b5132e
-
SHA256
ee298eb059f33be6909e14b0d61ba3d4c8b4c76bcf987c26896d8542fb0a5a6b
-
SHA512
8e0c69ee07dce1131bca7342fa77d44e3f32e0988d8856ffad1ac3720197fde716b38a188e7bfbed985233d45e4c61a07486d16a7ea4caab6198165981fc0aef
-
SSDEEP
6144:QgAnWH04t5VRDmjYSYCpNQ0OGk5//i5fxg4Y+kX:FAWHHpGY900/q5phYZX
Malware Config
Extracted
azorult
http://kylestephensphd.com/eXtYu/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 3448 2064 d0457978ba4ccb7acc9de302ac977aec.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 3644 2064 WerFault.exe 88 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2064 d0457978ba4ccb7acc9de302ac977aec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3448 2064 d0457978ba4ccb7acc9de302ac977aec.exe 89 PID 2064 wrote to memory of 3448 2064 d0457978ba4ccb7acc9de302ac977aec.exe 89 PID 2064 wrote to memory of 3448 2064 d0457978ba4ccb7acc9de302ac977aec.exe 89 PID 2064 wrote to memory of 3448 2064 d0457978ba4ccb7acc9de302ac977aec.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0457978ba4ccb7acc9de302ac977aec.exe"C:\Users\Admin\AppData\Local\Temp\d0457978ba4ccb7acc9de302ac977aec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\d0457978ba4ccb7acc9de302ac977aec.exe"C:\Users\Admin\AppData\Local\Temp\d0457978ba4ccb7acc9de302ac977aec.exe"2⤵PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 3242⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2064 -ip 20641⤵PID:3484