Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 13:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe
Resource
win10v2004-20241007-en
General
-
Target
5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe
-
Size
1.1MB
-
MD5
4484188cb0697ff50810eda8a0274c40
-
SHA1
04432824008a4a5a82d259bf9df637cbecaac3f0
-
SHA256
5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096
-
SHA512
ea0dd1d49755abf04a8fb07b8ab9bd72dc64af8c7858e751a5dd38a14bf249c8c78bbcf97dfdd58f14399ab35d309c87cb6c1272b920c61781df5e577e81b361
-
SSDEEP
24576:MAHnh+eWsN3skA4RV1Hom2KXMmHa0cH6Ww/aRf+j5k:rh+ZkldoPK8Ya022k
Malware Config
Extracted
azorult
http://parcelinn.com/wp-content/images/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cmjhdfjfddf.url 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2772 set thread context of 3632 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3632 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 82 PID 2772 wrote to memory of 3632 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 82 PID 2772 wrote to memory of 3632 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 82 PID 2772 wrote to memory of 3632 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 82 PID 2772 wrote to memory of 3632 2772 5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe"C:\Users\Admin\AppData\Local\Temp\5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe"C:\Users\Admin\AppData\Local\Temp\5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3632
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestparcelinn.comIN AResponseparcelinn.comIN A78.135.65.4
-
POSThttp://parcelinn.com/wp-content/images/index.php5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exeRemote address:78.135.65.4:80RequestPOST /wp-content/images/index.php HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
Host: parcelinn.com
Content-Length: 105
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Keep-Alive: timeout=5, max=100
content-type: text/html; charset=UTF-8
content-length: 0
date: Sat, 25 Jan 2025 13:01:33 GMT
server: LiteSpeed
-
Remote address:8.8.8.8:53Requestparcelinn.comIN AResponseparcelinn.comIN A78.135.65.4
-
POSThttp://parcelinn.com/wp-content/images/index.php5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exeRemote address:78.135.65.4:80RequestPOST /wp-content/images/index.php HTTP/1.0
Host: parcelinn.com
Connection: close
User-agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
Content-Length: 105
ResponseHTTP/1.0 200 OK
content-type: text/html; charset=UTF-8
content-length: 0
date: Sat, 25 Jan 2025 13:01:33 GMT
server: LiteSpeed
-
Remote address:8.8.8.8:53Request180.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request4.65.135.78.in-addr.arpaIN PTRResponse4.65.135.78.in-addr.arpaIN PTRrcp03hostingshcomtr
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.173.78.104.in-addr.arpaIN PTRResponse167.173.78.104.in-addr.arpaIN PTRa104-78-173-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.190.18.2.in-addr.arpaIN PTRResponse167.190.18.2.in-addr.arpaIN PTRa2-18-190-167deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request134.130.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
78.135.65.4:80http://parcelinn.com/wp-content/images/index.phphttp5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe513 B 322 B 5 3
HTTP Request
POST http://parcelinn.com/wp-content/images/index.phpHTTP Response
200 -
78.135.65.4:80http://parcelinn.com/wp-content/images/index.phphttp5a5784318e195205f17fe5fe4f4bc91f1673080426ec07fe1d2a963dab746096N.exe507 B 365 B 5 5
HTTP Request
POST http://parcelinn.com/wp-content/images/index.phpHTTP Response
200
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
59 B 75 B 1 1
DNS Request
parcelinn.com
DNS Response
78.135.65.4
-
59 B 75 B 1 1
DNS Request
parcelinn.com
DNS Response
78.135.65.4
-
72 B 147 B 1 1
DNS Request
180.129.81.91.in-addr.arpa
-
70 B 107 B 1 1
DNS Request
4.65.135.78.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
73.31.126.40.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
167.173.78.104.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
167.190.18.2.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
134.130.81.91.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa