Analysis
-
max time kernel
103s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
4f39173e3003531c1cd75641b55ccbca.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
4f39173e3003531c1cd75641b55ccbca.exe
Resource
win10v2004-20250314-en
General
-
Target
4f39173e3003531c1cd75641b55ccbca.exe
-
Size
90KB
-
MD5
4f39173e3003531c1cd75641b55ccbca
-
SHA1
7516626d6d3336826e25e58f55518f6a88be7f91
-
SHA256
5b15cd544d3b9bc4cab21814d46fb1eae2b9ec92a6865fb35fd5eb37cd9cebba
-
SHA512
c49718203ac231ef1e7b48f3d3438d0761330707bee55b9a62865b4f61ea7f2c7c1d91ec46a32cb413d5214beff6b9cc2af70703891ebb871075f8d84cde2d6a
-
SSDEEP
1536:HP5xQViGFL9GD6OzoliH+00LK7l73wrqXrLmK9Vg11f2+ZfYjaoQq:v5xnQc65l/fW93wr+Lmk41ffYm5q
Malware Config
Extracted
azorult
http://broadwayanimalhospital.ca/wp-blog/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f39173e3003531c1cd75641b55ccbca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f39173e3003531c1cd75641b55ccbca.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4460 4f39173e3003531c1cd75641b55ccbca.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88 PID 4460 wrote to memory of 3196 4460 4f39173e3003531c1cd75641b55ccbca.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exe"C:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exeC:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exe2⤵
- System Location Discovery: System Language Discovery
PID:3196
-