Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
054a6eddefc70dff71e491106a8e64ce.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
054a6eddefc70dff71e491106a8e64ce.exe
Resource
win10v2004-20240508-en
General
-
Target
054a6eddefc70dff71e491106a8e64ce.exe
-
Size
2.2MB
-
MD5
054a6eddefc70dff71e491106a8e64ce
-
SHA1
e3152b9548d852adc492ffe095e58b725e6fa159
-
SHA256
890df73a5c131dd74522fca2bad1b159663133afef6203ba03d310a423173e49
-
SHA512
27e69af7657da0b82951370eda4ca32b24a5b51ec090cc777380e19986fe39402b1a4cb8a96f96d838883e129dce8533e48a00dc57cf2f127c8aace464d2172f
-
SSDEEP
49152:NNiz0ztMs0jXUye9NqPJOu0NwYsZ+AiWLGgKTO6YFHSnr:+Izh0PhOukwYsZ+A+gKTO+r
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
054a6eddefc70dff71e491106a8e64ce.exedescription pid process target process PID 1228 set thread context of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
054a6eddefc70dff71e491106a8e64ce.exedescription pid process Token: SeDebugPrivilege 1228 054a6eddefc70dff71e491106a8e64ce.exe Token: SeDebugPrivilege 1228 054a6eddefc70dff71e491106a8e64ce.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
054a6eddefc70dff71e491106a8e64ce.exedescription pid process target process PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe PID 1228 wrote to memory of 3972 1228 054a6eddefc70dff71e491106a8e64ce.exe 054a6eddefc70dff71e491106a8e64ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"C:\Users\Admin\AppData\Local\Temp\054a6eddefc70dff71e491106a8e64ce.exe"2⤵PID:3972