Analysis
-
max time kernel
104s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
4f39173e3003531c1cd75641b55ccbca.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
4f39173e3003531c1cd75641b55ccbca.exe
Resource
win10v2004-20250314-en
General
-
Target
4f39173e3003531c1cd75641b55ccbca.exe
-
Size
90KB
-
MD5
4f39173e3003531c1cd75641b55ccbca
-
SHA1
7516626d6d3336826e25e58f55518f6a88be7f91
-
SHA256
5b15cd544d3b9bc4cab21814d46fb1eae2b9ec92a6865fb35fd5eb37cd9cebba
-
SHA512
c49718203ac231ef1e7b48f3d3438d0761330707bee55b9a62865b4f61ea7f2c7c1d91ec46a32cb413d5214beff6b9cc2af70703891ebb871075f8d84cde2d6a
-
SSDEEP
1536:HP5xQViGFL9GD6OzoliH+00LK7l73wrqXrLmK9Vg11f2+ZfYjaoQq:v5xnQc65l/fW93wr+Lmk41ffYm5q
Malware Config
Extracted
azorult
http://broadwayanimalhospital.ca/wp-blog/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4368 set thread context of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f39173e3003531c1cd75641b55ccbca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f39173e3003531c1cd75641b55ccbca.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4368 4f39173e3003531c1cd75641b55ccbca.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89 PID 4368 wrote to memory of 5980 4368 4f39173e3003531c1cd75641b55ccbca.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exe"C:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exeC:\Users\Admin\AppData\Local\Temp\4f39173e3003531c1cd75641b55ccbca.exe2⤵
- System Location Discovery: System Language Discovery
PID:5980
-