Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
db3cb1ca9eaff73d31715d03c0bffba2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db3cb1ca9eaff73d31715d03c0bffba2.exe
Resource
win10v2004-20240226-en
General
-
Target
db3cb1ca9eaff73d31715d03c0bffba2.exe
-
Size
322KB
-
MD5
db3cb1ca9eaff73d31715d03c0bffba2
-
SHA1
71fdbeb59f7d04e777723a72814ee1d3a2f4d1c8
-
SHA256
51576193c87090f830b90827e9266565e9b7dd293d4818ea92e9538d68386e2b
-
SHA512
a83132f7567bc8d4fe95a70625ce9c55401cd5ec23abbafe5775caee01914187a0b10794fa244e0fe197c99c1f7e93d752683b2f2f9c1e96fb73e462d40cb9ca
-
SSDEEP
6144:TA5wtxEvZVIyXasfKolvHdLYHrjWcm8PxS1V9Hsa7p5w:YwtaX1aqZldLYHmcPc9p7py
Malware Config
Extracted
azorult
http://203.159.80.136/nx/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 448 2712 WerFault.exe db3cb1ca9eaff73d31715d03c0bffba2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db3cb1ca9eaff73d31715d03c0bffba2.exe"C:\Users\Admin\AppData\Local\Temp\db3cb1ca9eaff73d31715d03c0bffba2.exe"1⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 14322⤵
- Program crash
PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2712 -ip 27121⤵PID:2248