Analysis
-
max time kernel
98s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2025, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe
Resource
win10v2004-20250217-en
General
-
Target
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe
-
Size
4.6MB
-
MD5
9477fb9ee926c590fed50efc8bff65ed
-
SHA1
d5dc147a31a6adce4be7b59efa97710dd62eb77d
-
SHA256
8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8
-
SHA512
6c6ab540c7b235a4f367b1b9e5d138650d030b07b044ed67f40c013846f0361792053efd9021bcd6db90d3122632fca160547bca866b68859d059f124649dd07
-
SSDEEP
98304:EL4L90sBb8VQNvZNGQA/A3BRbT5CWXhZt0vU8buP1pi4YGjs5AcqR:EYRBblNvGQA/ARRbYWXhH09uP1pwwUCR
Malware Config
Extracted
azorult
http://auth.sunroofeses.info/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe -
Executes dropped EXE 1 IoCs
pid Process 3676 1.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 iplogger.com 22 iplogger.com -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3956-3-0x00000000005D0000-0x0000000000C71000-memory.dmp autoit_exe behavioral2/memory/3956-4-0x00000000005D0000-0x0000000000C71000-memory.dmp autoit_exe behavioral2/memory/3956-5-0x00000000005D0000-0x0000000000C71000-memory.dmp autoit_exe behavioral2/memory/3956-13-0x00000000005D0000-0x0000000000C71000-memory.dmp autoit_exe behavioral2/memory/3956-32-0x00000000005D0000-0x0000000000C71000-memory.dmp autoit_exe behavioral2/memory/3956-34-0x00000000005D0000-0x0000000000C71000-memory.dmp autoit_exe behavioral2/memory/3956-35-0x00000000005D0000-0x0000000000C71000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3956 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 3676 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8D763589-87E8-46E3-92D7-FB93C28B7953}\Implemented Categories\{00021492-0000-0000-C000-000000000046} 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8D763589-87E8-46E3-92D7-FB93C28B7953} 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8D763589-87E8-46E3-92D7-FB93C28B7953}\Implemented Categories 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3956 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 3956 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 3676 1.exe 3676 1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3676 3956 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 88 PID 3956 wrote to memory of 3676 3956 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 88 PID 3956 wrote to memory of 3676 3956 8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe"C:\Users\Admin\AppData\Local\Temp\8251eb64179cc43bf27807daee64dc366cdf0ea7a5b79424b15a38bd64e934c8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5ee22ae76dfa1a54beddfba79821fca59
SHA1c6a7f12371883c71883efb6b16f1445c35861c9b
SHA25646bf0d65f49efcab5d3c746d01dbebbc3b4eb5274d8c1e4270fca45e7c7b8249
SHA512e86e7595ba7925e1418115b83456dc00f6a378af92a5a97d4954caf26b984853a1c7cf9f90ee1a6adfaf1860cab09d936fb3103f88e155ae3885901573e85fb3