Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
ExeFile (120).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ExeFile (120).exe
Resource
win10v2004-20240802-en
General
-
Target
ExeFile (120).exe
-
Size
400KB
-
MD5
bfc6d784ac40e0aa03c2889b5fe7d661
-
SHA1
39cc39a970d8a1228c8591d478be5bcf98bec30e
-
SHA256
af5d9e7613baf2df33d65f060279f5678e92b6fc123efb7ac45ffabca5a2e23c
-
SHA512
252b4e4f38f1b304ed23958657f0b1698b7c9c47f9685e60d66ae36aeb91a7ff11ce94e51ace0d386c6db9398a90ffe52cd53bd0de6d0f19f5f75dfc5d70929f
-
SSDEEP
12288:4qlZi970zIZAx0qXsNd0v9g1agdLXK7z:zZrx09NdY9Grdk
Malware Config
Extracted
azorult
http://129.146.140.127/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ExeFile (120).exedescription pid process target process PID 2988 set thread context of 2996 2988 ExeFile (120).exe ExeFile (120).exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ExeFile (120).exeExeFile (120).exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExeFile (120).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExeFile (120).exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
ExeFile (120).exedescription pid process target process PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe PID 2988 wrote to memory of 2996 2988 ExeFile (120).exe ExeFile (120).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExeFile (120).exe"C:\Users\Admin\AppData\Local\Temp\ExeFile (120).exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\ExeFile (120).exe"{path}"2⤵
- System Location Discovery: System Language Discovery
PID:2996