Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
d53c8a9351e8f882d8b79225bba17aa7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d53c8a9351e8f882d8b79225bba17aa7.exe
Resource
win10v2004-20240226-en
General
-
Target
d53c8a9351e8f882d8b79225bba17aa7.exe
-
Size
1.4MB
-
MD5
d53c8a9351e8f882d8b79225bba17aa7
-
SHA1
08bf592cefb4358afa4c0fd1bb77717cfa86030a
-
SHA256
b4d1ee0e59a2113473a47b726eb279d4960b810dbb483507f84b6314185c6dad
-
SHA512
a361ae39ec5a998215f38003dedfa3311f5c49717dad8a4e0358cd8f08045a0c0a236d2a5ba9e9e097cf9f3bcc2227da44edb3369ecbc39a73e0470d0cf03eee
-
SSDEEP
24576:Mu6J33O0c+JY5UZ+XC0kGso6FaaEeMft5so3632E/nw+FheCrjLIuGWY:Wu0c++OCvkGs9FaHe0t6z325CrLY
Malware Config
Extracted
azorult
http://invalid666.zzz.com.ua/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
d53c8a9351e8f882d8b79225bba17aa7.exedescription pid process target process PID 3924 set thread context of 2052 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
d53c8a9351e8f882d8b79225bba17aa7.exepid process 3924 d53c8a9351e8f882d8b79225bba17aa7.exe 3924 d53c8a9351e8f882d8b79225bba17aa7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 4668 svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
d53c8a9351e8f882d8b79225bba17aa7.exepid process 3924 d53c8a9351e8f882d8b79225bba17aa7.exe 3924 d53c8a9351e8f882d8b79225bba17aa7.exe 3924 d53c8a9351e8f882d8b79225bba17aa7.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
d53c8a9351e8f882d8b79225bba17aa7.exepid process 3924 d53c8a9351e8f882d8b79225bba17aa7.exe 3924 d53c8a9351e8f882d8b79225bba17aa7.exe 3924 d53c8a9351e8f882d8b79225bba17aa7.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
d53c8a9351e8f882d8b79225bba17aa7.exedescription pid process target process PID 3924 wrote to memory of 1424 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe PID 3924 wrote to memory of 1424 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe PID 3924 wrote to memory of 1424 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe PID 3924 wrote to memory of 2052 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe PID 3924 wrote to memory of 2052 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe PID 3924 wrote to memory of 2052 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe PID 3924 wrote to memory of 2052 3924 d53c8a9351e8f882d8b79225bba17aa7.exe dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d53c8a9351e8f882d8b79225bba17aa7.exe"C:\Users\Admin\AppData\Local\Temp\d53c8a9351e8f882d8b79225bba17aa7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"2⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2052-2-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2052-4-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2052-5-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2052-6-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3924-0-0x0000000003A10000-0x0000000003A2D000-memory.dmpFilesize
116KB
-
memory/3924-1-0x0000000003A30000-0x0000000003A4C000-memory.dmpFilesize
112KB
-
memory/4668-7-0x0000013C87470000-0x0000013C87480000-memory.dmpFilesize
64KB
-
memory/4668-23-0x0000013C87570000-0x0000013C87580000-memory.dmpFilesize
64KB
-
memory/4668-39-0x0000013C8F8E0000-0x0000013C8F8E1000-memory.dmpFilesize
4KB
-
memory/4668-41-0x0000013C8F910000-0x0000013C8F911000-memory.dmpFilesize
4KB
-
memory/4668-42-0x0000013C8F910000-0x0000013C8F911000-memory.dmpFilesize
4KB
-
memory/4668-43-0x0000013C8FA20000-0x0000013C8FA21000-memory.dmpFilesize
4KB