analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

NEW ORDER.exe

Full analysis: https://app.any.run/tasks/848e30c1-bcdb-43d8-a9b2-92c414da0255
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: February 19, 2019, 04:53:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
azorult
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

13A18C622E98AAD0AE73F611ABCA035C

SHA1:

9BEC01E4E097F33A2CE76C23313CBA2CCAE719CA

SHA256:

0F0250AACC18657B66DA72F6E2B5BDF01087CC7775D69492D8DB86CE5C172D00

SSDEEP:

3072:AUtEgXXJYvTujSZoxnEcjl2tRtEkJojAgmmfNp90tlmHP5eusunLBTby5eMmI/ea:ACEnutlajE9fZbxb55043fz5ExIT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AZORULT was detected

      • vbc.exe (PID: 3024)
    • Writes to a start menu file

      • NEW ORDER.exe (PID: 2992)
    • Connects to CnC server

      • vbc.exe (PID: 3024)
  • SUSPICIOUS

    • Executes scripts

      • NEW ORDER.exe (PID: 2992)
    • Executable content was dropped or overwritten

      • NEW ORDER.exe (PID: 2992)
    • Creates files in the user directory

      • NEW ORDER.exe (PID: 2992)
    • Application launched itself

      • taskmgr.exe (PID: 3816)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (81)
.dll | Win32 Dynamic Link Library (generic) (7.2)
.exe | Win32 Executable (generic) (4.9)
.exe | Win16/32 Executable Delphi generic (2.2)
.exe | Generic Win/DOS Executable (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:02:18 23:07:51+01:00
PEType: PE32
LinkerVersion: 6
CodeSize: 1424384
InitializedDataSize: 3072
UninitializedDataSize: -
EntryPoint: 0x15da9e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription: 10e360cc-6b77-4d12-9dc5-7238d41e08d
FileVersion: 1.0.0.0
InternalName: ecSPdXWeqIjHiiTqm.exe
LegalCopyright: 4e0476e3-5c23-41cd-be47-9a29536f2881
OriginalFileName: 93dfff4f-3673-4681-8640-56f1cbbcfd7f.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 0.0.0.0
ProductName: b7d13858-bc35-447c-804d-6734b2e6b6b8
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start new order.exe #AZORULT vbc.exe taskmgr.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
2992"C:\Users\admin\AppData\Local\Temp\NEW ORDER.exe" C:\Users\admin\AppData\Local\Temp\NEW ORDER.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
10e360cc-6b77-4d12-9dc5-7238d41e08d
Exit code:
0
Version:
1.0.0.0
3024"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
NEW ORDER.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Version:
14.0.1055.0
3816"C:\Windows\system32\taskmgr.exe" /4C:\Windows\system32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3580"C:\Windows\system32\taskmgr.exe" /1C:\Windows\system32\taskmgr.exe
taskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
102
Read events
75
Write events
27
Delete events
0

Modification events

(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3024) vbc.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\vbc_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2992NEW ORDER.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.urltext
MD5:769EA530BFCA8654F9F5874D3166BCD1
SHA256:5778C4C2E159371661F27AE7D3CA755F7030AEB26605B9797352616D50D09642
2992NEW ORDER.exeC:\Users\admin\AppData\Roaming\ExecuteUpdate.exeexecutable
MD5:13A18C622E98AAD0AE73F611ABCA035C
SHA256:0F0250AACC18657B66DA72F6E2B5BDF01087CC7775D69492D8DB86CE5C172D00
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3024
vbc.exe
POST
47.254.177.121:80
http://ata-modenna.com/dubai/index.php
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3024
vbc.exe
47.254.177.121:80
ata-modenna.com
Alibaba (China) Technology Co., Ltd.
US
malicious

DNS requests

Domain
IP
Reputation
ata-modenna.com
  • 47.254.177.121
malicious

Threats

PID
Process
Class
Message
3024
vbc.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
3024
vbc.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
3024
vbc.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult HTTP Header
1 ETPRO signatures available at the full report
No debug info