Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe
-
Size
813KB
-
MD5
059ea19d73d0fcde9100cc085627169d
-
SHA1
916dda3e7c94168e82fc8e4b8f60c418fb6e078f
-
SHA256
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1
-
SHA512
faa5f3020df251116867073439a0339e5bcab8f962c1d5ce6c7c5761ca29bf56e5e761d76ffba1abca16d943db4c332ac5499df07e31abb24efb93d02b53dd7c
-
SSDEEP
24576:2vYV0HT73uFBgmza/N1tgyks7pQNFHiP8P777:xOzavgAG1tXkkpYFCPWL
Malware Config
Extracted
azorult
http://mhlc.shop/GI341/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
Processes:
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exepid process 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exepid process 2940 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exepid process 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 2940 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exedescription pid process target process PID 2672 set thread context of 2940 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exepid process 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exedescription pid process target process PID 2672 wrote to memory of 2940 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe PID 2672 wrote to memory of 2940 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe PID 2672 wrote to memory of 2940 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe PID 2672 wrote to memory of 2940 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe PID 2672 wrote to memory of 2940 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe PID 2672 wrote to memory of 2940 2672 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe 6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe"C:\Users\Admin\AppData\Local\Temp\6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe"C:\Users\Admin\AppData\Local\Temp\6f57d16541da2643046a91a928edf231bad5823141b0f47ae858ab5c7ea383a1.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fc90dfb694d0e17b013d6f818bce41b0
SHA13243969886d640af3bfa442728b9f0dff9d5f5b0
SHA2567fe77ca13121a113c59630a3dba0c8aaa6372e8082393274da8f8608c4ce4528
SHA512324f13aa7a33c6408e2a57c3484d1691ecee7c3c1366de2bb8978c8dc66b18425d8cab5a32d1702c13c43703e36148a022263de7166afdce141da2b01169f1c6