Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe
Resource
win10v2004-20240802-en
General
-
Target
97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe
-
Size
1.0MB
-
MD5
97cc0e7d7caa3483e4c5e5cff9fbe67e
-
SHA1
e74e03ad3d8f52ce5858a5e8208343fa04a2b367
-
SHA256
65e1b5713b271302e96bab80440f744c13c953749562603ea3ee03eda880f9ea
-
SHA512
320b84be5ade8681a0be7bd862dfa1b65f75189cc95967ed586d9efdb3c68a8f243861c399339b42f9688561c2f217a6e9d8e4b2e586a4d4f2f583eca711c357
-
SSDEEP
24576:OLPskXqS0jFC6LkpzqPskXqS0jFC6LkpzWoKywypSpbYmb93PK/:QJXUJC6LkpzqJXUJC6LkpzEMSNYmpy/
Malware Config
Extracted
azorult
https://ehzwq.shop/erd/mac/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3636 set thread context of 2576 3636 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 2576 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3636 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3636 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3636 wrote to memory of 2576 3636 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 93 PID 3636 wrote to memory of 2576 3636 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 93 PID 3636 wrote to memory of 2576 3636 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 93 PID 3636 wrote to memory of 2576 3636 97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe"C:\Users\Admin\AppData\Local\Temp\97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe"C:\Users\Admin\AppData\Local\Temp\97CC0E7D7CAA3483E4C5E5CFF9FBE67E.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576
-