Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
Product Order List.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Product Order List.exe
Resource
win10v2004-20241007-en
General
-
Target
Product Order List.exe
-
Size
650KB
-
MD5
ed0036978d1f0d13c67c94edc283e131
-
SHA1
5176e4a336fce9a98fb19d3fcb43c3510dc85f64
-
SHA256
a18751ed6b5abd2fa637e0d4aa4eb794ee98b00e631c0fd2a4f92e9aeeca53e5
-
SHA512
26724f913b8e51fd883ba74f298429fa17ac367c02d6437f271eca670f3243fc4a86713fc80a2c759bb43366390bd32bc6fb3485baebb7ece36d4a7edf37a88c
-
SSDEEP
12288:VV0WtzPtYaer5hxPY3bvl/ZeUEjZZaJ8SsBdYaer:VV0WVMr5TYLFUa8SsSr
Malware Config
Extracted
azorult
http://193.247.144.166/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1312 set thread context of 1036 1312 Product Order List.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Product Order List.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Product Order List.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100 PID 1312 wrote to memory of 1036 1312 Product Order List.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Product Order List.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:3620