Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
Product Order List.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Product Order List.exe
Resource
win10v2004-20241007-en
General
-
Target
Product Order List.exe
-
Size
650KB
-
MD5
ed0036978d1f0d13c67c94edc283e131
-
SHA1
5176e4a336fce9a98fb19d3fcb43c3510dc85f64
-
SHA256
a18751ed6b5abd2fa637e0d4aa4eb794ee98b00e631c0fd2a4f92e9aeeca53e5
-
SHA512
26724f913b8e51fd883ba74f298429fa17ac367c02d6437f271eca670f3243fc4a86713fc80a2c759bb43366390bd32bc6fb3485baebb7ece36d4a7edf37a88c
-
SSDEEP
12288:VV0WtzPtYaer5hxPY3bvl/ZeUEjZZaJ8SsBdYaer:VV0WVMr5TYLFUa8SsSr
Malware Config
Extracted
azorult
http://193.247.144.166/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2856 set thread context of 2704 2856 Product Order List.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Product Order List.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Product Order List.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2856 Product Order List.exe 2856 Product Order List.exe 2856 Product Order List.exe 2856 Product Order List.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2856 Product Order List.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2636 2856 Product Order List.exe 31 PID 2856 wrote to memory of 2636 2856 Product Order List.exe 31 PID 2856 wrote to memory of 2636 2856 Product Order List.exe 31 PID 2856 wrote to memory of 2636 2856 Product Order List.exe 31 PID 2856 wrote to memory of 2656 2856 Product Order List.exe 32 PID 2856 wrote to memory of 2656 2856 Product Order List.exe 32 PID 2856 wrote to memory of 2656 2856 Product Order List.exe 32 PID 2856 wrote to memory of 2656 2856 Product Order List.exe 32 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33 PID 2856 wrote to memory of 2704 2856 Product Order List.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"{path}"2⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"{path}"2⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
PID:2704
-