Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
ORDER WORKBOOK.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ORDER WORKBOOK.exe
Resource
win10v2004-20241007-en
General
-
Target
ORDER WORKBOOK.exe
-
Size
1.3MB
-
MD5
38c3c643e80618c83b80b990ae16abe2
-
SHA1
ee93f02563f008c2715c26b4f8478410e09babcd
-
SHA256
ff2f7cc30d0eca889fbe37a6ea28172ac1dc0b2ea3563a622cc7de25a96e07f6
-
SHA512
26328038bbbb4523fd0dbfa8338a1bb09833a5c70de4240aa29944f4d103d358afe673246b924bb69a1f4134b0e945cf03b40685970e863a7f29d5ed02c24111
-
SSDEEP
6144:brZwfez59eDoFWRXBgh+3A9IBtuC/eRwgdv3/Te0nlMugNUzGpk4YAkcYgs0PZ5m:Kf859eDoWDghT/Co43+iscbqn24qAaq
Malware Config
Extracted
azorult
http://136.144.41.34/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4736 set thread context of 3464 4736 ORDER WORKBOOK.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER WORKBOOK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER WORKBOOK.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4736 ORDER WORKBOOK.exe 4736 ORDER WORKBOOK.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 ORDER WORKBOOK.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2152 4736 ORDER WORKBOOK.exe 96 PID 4736 wrote to memory of 2152 4736 ORDER WORKBOOK.exe 96 PID 4736 wrote to memory of 2152 4736 ORDER WORKBOOK.exe 96 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97 PID 4736 wrote to memory of 3464 4736 ORDER WORKBOOK.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER WORKBOOK.exe"C:\Users\Admin\AppData\Local\Temp\ORDER WORKBOOK.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\ORDER WORKBOOK.exe"{path}"2⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER WORKBOOK.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
PID:3464
-