Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
ZiraatTRK6575740.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ZiraatTRK6575740.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/cse4roo.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/cse4roo.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/cse4roo.dll
-
Size
5KB
-
MD5
55ece16004aa5f4e2922619cd4550be1
-
SHA1
314c0edc2a812e88da96322d340919f63a392d8d
-
SHA256
3ce9036a2569c7c3c15061528ecf49747620d4fd3b22338694c9525c6c0e4fc3
-
SHA512
25cba598082fc6d7705a0c0e7de491fe156fce88308fe510d70d40c01bf458849cf9f50f190ad67ca742b2829357170978accae1d3eeb9190850d3dc4746aa24
-
SSDEEP
48:StQJNdo8BP/hHSmDJjtrMOGa4zzBvoAXAdUMQ9BgKRuqS:PRjZDGXHBgVueqx
Malware Config
Extracted
azorult
http://bengalcement.com.bd/AxPu/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3644 set thread context of 4500 3644 rundll32.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4780 4500 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3644 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1400 wrote to memory of 3644 1400 rundll32.exe 82 PID 1400 wrote to memory of 3644 1400 rundll32.exe 82 PID 1400 wrote to memory of 3644 1400 rundll32.exe 82 PID 3644 wrote to memory of 4500 3644 rundll32.exe 83 PID 3644 wrote to memory of 4500 3644 rundll32.exe 83 PID 3644 wrote to memory of 4500 3644 rundll32.exe 83 PID 3644 wrote to memory of 4500 3644 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\cse4roo.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\cse4roo.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\cse4roo.dll,#13⤵
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 12684⤵
- Program crash
PID:4780
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4500 -ip 45001⤵PID:1136