Analysis
-
max time kernel
21s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
loop.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
loop.exe
Resource
win10v2004-20240802-en
General
-
Target
loop.exe
-
Size
252KB
-
MD5
d2eaaf2acb0a9894ba2c8d33d821d693
-
SHA1
6d1d1bb054a119c0eaa6bb51ba9ecebf4967adb8
-
SHA256
f28b127825a864671be79c6a44a627ef806b5f3b483a65b100ca3b1884c1864c
-
SHA512
c36fe63995d6d4ffb9fb870f6bd373d7c92730986187f43e2c8b231b2d4e11f729339f6f5ba9812be7c55a48b68d7ab51ebb8279ea12d1b5b1489c7a3d5978e4
-
SSDEEP
6144:tQsOuwyaS3S4409JQI74/PBW7RSd5qDY:+sOJyaIS4rzlERW7R44D
Malware Config
Extracted
azorult
http://ssl.admin.itybuy.it/azs/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1848 set thread context of 2648 1848 loop.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loop.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1848 loop.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2648 1848 loop.exe 30 PID 1848 wrote to memory of 2648 1848 loop.exe 30 PID 1848 wrote to memory of 2648 1848 loop.exe 30 PID 1848 wrote to memory of 2648 1848 loop.exe 30 PID 1848 wrote to memory of 2648 1848 loop.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\loop.exe"C:\Users\Admin\AppData\Local\Temp\loop.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\loop.exe"C:\Users\Admin\AppData\Local\Temp\loop.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2648
-