Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2025, 02:52

General

  • Target

    8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe

  • Size

    4.6MB

  • MD5

    9477fb9ee926c590fed50efc8bff65ed

  • SHA1

    d5dc147a31a6adce4be7b59efa97710dd62eb77d

  • SHA256

    8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8

  • SHA512

    6c6ab540c7b235a4f367b1b9e5d138650d030b07b044ed67f40c013846f0361792053efd9021bcd6db90d3122632fca160547bca866b68859d059f124649dd07

  • SSDEEP

    98304:EL4L90sBb8VQNvZNGQA/A3BRbT5CWXhZt0vU8buP1pi4YGjs5AcqR:EYRBblNvGQA/ARRbYWXhH09uP1pwwUCR

Malware Config

Extracted

Family

azorult

C2

http://auth.sunroofeses.info/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Azorult family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe
    "C:\Users\Admin\AppData\Local\Temp\8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Roaming\1.exe
      "C:\Users\Admin\AppData\Roaming\1.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\1.exe

    Filesize

    2.9MB

    MD5

    ee22ae76dfa1a54beddfba79821fca59

    SHA1

    c6a7f12371883c71883efb6b16f1445c35861c9b

    SHA256

    46bf0d65f49efcab5d3c746d01dbebbc3b4eb5274d8c1e4270fca45e7c7b8249

    SHA512

    e86e7595ba7925e1418115b83456dc00f6a378af92a5a97d4954caf26b984853a1c7cf9f90ee1a6adfaf1860cab09d936fb3103f88e155ae3885901573e85fb3

  • memory/2708-27-0x0000000005560000-0x0000000005AF3000-memory.dmp

    Filesize

    5.6MB

  • memory/2708-28-0x0000000005560000-0x0000000005AF3000-memory.dmp

    Filesize

    5.6MB

  • memory/2708-4-0x0000000000240000-0x00000000008E1000-memory.dmp

    Filesize

    6.6MB

  • memory/2708-3-0x0000000000240000-0x00000000008E1000-memory.dmp

    Filesize

    6.6MB

  • memory/2708-1-0x0000000077C40000-0x0000000077C42000-memory.dmp

    Filesize

    8KB

  • memory/2708-11-0x0000000000240000-0x00000000008E1000-memory.dmp

    Filesize

    6.6MB

  • memory/2708-25-0x0000000005560000-0x0000000005AF3000-memory.dmp

    Filesize

    5.6MB

  • memory/2708-0-0x0000000000240000-0x00000000008E1000-memory.dmp

    Filesize

    6.6MB

  • memory/2708-2-0x0000000000241000-0x000000000029E000-memory.dmp

    Filesize

    372KB

  • memory/2708-26-0x0000000005560000-0x0000000005AF3000-memory.dmp

    Filesize

    5.6MB

  • memory/2708-37-0x0000000000240000-0x00000000008E1000-memory.dmp

    Filesize

    6.6MB

  • memory/2708-35-0x0000000000240000-0x00000000008E1000-memory.dmp

    Filesize

    6.6MB

  • memory/2708-30-0x0000000000240000-0x00000000008E1000-memory.dmp

    Filesize

    6.6MB

  • memory/2840-31-0x0000000000401000-0x000000000040D000-memory.dmp

    Filesize

    48KB

  • memory/2840-34-0x0000000000400000-0x0000000000993000-memory.dmp

    Filesize

    5.6MB

  • memory/2840-32-0x0000000000400000-0x0000000000993000-memory.dmp

    Filesize

    5.6MB

  • memory/2840-29-0x0000000000400000-0x0000000000993000-memory.dmp

    Filesize

    5.6MB