Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/03/2025, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe
Resource
win10v2004-20250217-en
General
-
Target
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe
-
Size
4.6MB
-
MD5
9477fb9ee926c590fed50efc8bff65ed
-
SHA1
d5dc147a31a6adce4be7b59efa97710dd62eb77d
-
SHA256
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8
-
SHA512
6c6ab540c7b235a4f367b1b9e5d138650d030b07b044ed67f40c013846f0361792053efd9021bcd6db90d3122632fca160547bca866b68859d059f124649dd07
-
SSDEEP
98304:EL4L90sBb8VQNvZNGQA/A3BRbT5CWXhZt0vU8buP1pi4YGjs5AcqR:EYRBblNvGQA/ARRbYWXhH09uP1pwwUCR
Malware Config
Extracted
azorult
http://auth.sunroofeses.info/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 1.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 1.exe -
Loads dropped DLL 4 IoCs
pid Process 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 iplogger.com 4 iplogger.com -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2708-4-0x0000000000240000-0x00000000008E1000-memory.dmp autoit_exe behavioral1/memory/2708-3-0x0000000000240000-0x00000000008E1000-memory.dmp autoit_exe behavioral1/memory/2708-11-0x0000000000240000-0x00000000008E1000-memory.dmp autoit_exe behavioral1/memory/2708-30-0x0000000000240000-0x00000000008E1000-memory.dmp autoit_exe behavioral1/memory/2708-35-0x0000000000240000-0x00000000008E1000-memory.dmp autoit_exe behavioral1/memory/2708-37-0x0000000000240000-0x00000000008E1000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 2840 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8D763589-87E8-46E3-92D7-FB93C28B7953} 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8D763589-87E8-46E3-92D7-FB93C28B7953}\Implemented Categories 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8D763589-87E8-46E3-92D7-FB93C28B7953}\Implemented Categories\{00021492-0000-0000-C000-000000000046} 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 2840 1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2840 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 30 PID 2708 wrote to memory of 2840 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 30 PID 2708 wrote to memory of 2840 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 30 PID 2708 wrote to memory of 2840 2708 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe"C:\Users\Admin\AppData\Local\Temp\8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5ee22ae76dfa1a54beddfba79821fca59
SHA1c6a7f12371883c71883efb6b16f1445c35861c9b
SHA25646bf0d65f49efcab5d3c746d01dbebbc3b4eb5274d8c1e4270fca45e7c7b8249
SHA512e86e7595ba7925e1418115b83456dc00f6a378af92a5a97d4954caf26b984853a1c7cf9f90ee1a6adfaf1860cab09d936fb3103f88e155ae3885901573e85fb3