Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
054a6eddefc70dff71e491106a8e64ce.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
054a6eddefc70dff71e491106a8e64ce.exe
Resource
win10v2004-20240508-en
General
-
Target
054a6eddefc70dff71e491106a8e64ce.exe
-
Size
2.2MB
-
MD5
054a6eddefc70dff71e491106a8e64ce
-
SHA1
e3152b9548d852adc492ffe095e58b725e6fa159
-
SHA256
890df73a5c131dd74522fca2bad1b159663133afef6203ba03d310a423173e49
-
SHA512
27e69af7657da0b82951370eda4ca32b24a5b51ec090cc777380e19986fe39402b1a4cb8a96f96d838883e129dce8533e48a00dc57cf2f127c8aace464d2172f
-
SSDEEP
49152:NNiz0ztMs0jXUye9NqPJOu0NwYsZ+AiWLGgKTO6YFHSnr:+Izh0PhOukwYsZ+A+gKTO+r
Malware Config
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
054a6eddefc70dff71e491106a8e64ce.exedescription pid process target process PID 2360 set thread context of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3248 3152 WerFault.exe 054a6eddefc70dff71e491106a8e64ce.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
054a6eddefc70dff71e491106a8e64ce.exedescription pid process Token: SeDebugPrivilege 2360 054a6eddefc70dff71e491106a8e64ce.exe Token: SeDebugPrivilege 2360 054a6eddefc70dff71e491106a8e64ce.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
054a6eddefc70dff71e491106a8e64ce.exe054a6eddefc70dff71e491106a8e64ce.exedescription pid process target process PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 2360 wrote to memory of 3152 2360 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 3152 wrote to memory of 3248 3152 054a6eddefc70dff71e491106a8e64ce.exe WerFault.exe PID 3152 wrote to memory of 3248 3152 054a6eddefc70dff71e491106a8e64ce.exe WerFault.exe PID 3152 wrote to memory of 3248 3152 054a6eddefc70dff71e491106a8e64ce.exe WerFault.exe PID 3152 wrote to memory of 3248 3152 054a6eddefc70dff71e491106a8e64ce.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 4803⤵
- Program crash
PID:3248