analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

payload.ps1

Full analysis: https://app.any.run/tasks/23b2e36e-6f70-47b6-912a-7a8ecad0dd01
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: July 11, 2019, 20:55:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
godzilla
rat
azorult
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines
MD5:

0CF05FC0E2B1F0FEE31B1B0C204BC7EB

SHA1:

6C514FAB14234C71B42C871C9E06D536A5B3C482

SHA256:

6548AE6CF74F6009BA0C0D381C9E32D6468ACC18C4BA2F4636F2DA88C9D60DAB

SSDEEP:

12288:bSYw5xWAEyddG9OF3yLH2X61XC2HpejxSQ:OYwLWAEUI/j1yjxJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • iopl.exe (PID: 2800)
      • iopl.exe (PID: 2968)
      • eKK9QZTIl443XGz8wu265cwR6.exe (PID: 2336)
      • au4T6j7hTuRnPR5SZTr6eSg6R.exe (PID: 3480)
      • Wda65x1xuIyAJ2PCGlBX1lH2Y.exe (PID: 3856)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 2556)
      • Wda65x1xuIyAJ2PCGlBX1lH2Y.exe (PID: 2056)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
      • a2nw234efg354_signed.exe (PID: 2568)
      • rfsd543fg354gdf_signed.exe (PID: 3036)
      • winidsi34dfg_signed.exe (PID: 2196)
      • rfds34hfgdf34.exe (PID: 2640)
    • GODZILLA was detected

      • iopl.exe (PID: 2968)
    • Connects to CnC server

      • iopl.exe (PID: 2968)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
    • AZORULT was detected

      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
    • Loads dropped or rewritten executable

      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
    • Actions looks like stealing of personal data

      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
    • Downloads executable files from the Internet

      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
  • SUSPICIOUS

    • Creates files in the user directory

      • powershell.exe (PID: 3100)
      • iopl.exe (PID: 2968)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 3100)
      • iopl.exe (PID: 2968)
      • RegAsm.exe (PID: 3408)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
    • Application launched itself

      • iopl.exe (PID: 2800)
      • Wda65x1xuIyAJ2PCGlBX1lH2Y.exe (PID: 3856)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 2556)
    • PowerShell script executed

      • powershell.exe (PID: 3100)
    • Reads internet explorer settings

      • iopl.exe (PID: 2968)
    • Reads the cookies of Mozilla Firefox

      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
    • Reads the cookies of Google Chrome

      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
    • Starts CMD.EXE for commands execution

      • au4T6j7hTuRnPR5SZTr6eSg6R.exe (PID: 3480)
      • eKK9QZTIl443XGz8wu265cwR6.exe (PID: 2336)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
      • a2nw234efg354_signed.exe (PID: 2568)
      • winidsi34dfg_signed.exe (PID: 2196)
    • Starts CMD.EXE for self-deleting

      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
  • INFO

    • Manual execution by user

      • Wda65x1xuIyAJ2PCGlBX1lH2Y.exe (PID: 3856)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 2556)
      • au4T6j7hTuRnPR5SZTr6eSg6R.exe (PID: 3480)
      • eKK9QZTIl443XGz8wu265cwR6.exe (PID: 2336)
    • Dropped object may contain Bitcoin addresses

      • iopl.exe (PID: 2968)
      • dwwpQzThss7BXhWUbepfSu2ox.exe (PID: 3584)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
64
Monitored processes
23
Malicious processes
4
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start powershell.exe iopl.exe no specs #GODZILLA iopl.exe wda65x1xuiyaj2pcglbx1lh2y.exe no specs dwwpqzthss7bxhwubepfsu2ox.exe au4t6j7hturnpr5sztr6esg6r.exe no specs ekk9qztil443xgz8wu265cwr6.exe no specs wda65x1xuiyaj2pcglbx1lh2y.exe no specs #AZORULT dwwpqzthss7bxhwubepfsu2ox.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs regasm.exe winidsi34dfg_signed.exe no specs a2nw234efg354_signed.exe no specs rfds34hfgdf34.exe rfsd543fg354gdf_signed.exe no specs cmd.exe no specs timeout.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3100"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-file" "C:\Users\admin\AppData\Local\Temp\payload.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2800"C:\Users\Public\iopl.exe"C:\Users\Public\iopl.exepowershell.exe
User:
admin
Company:
wallbound
Integrity Level:
MEDIUM
Description:
Wheaton5
Exit code:
0
Version:
1.02.0007
2968C:\Users\Public\iopl.exe"C:\Users\Public\iopl.exe
iopl.exe
User:
admin
Company:
wallbound
Integrity Level:
MEDIUM
Description:
Wheaton5
Exit code:
1337
Version:
1.02.0007
3856"C:\Users\admin\AppData\Local\Temp\Wda65x1xuIyAJ2PCGlBX1lH2Y.exe" C:\Users\admin\AppData\Local\Temp\Wda65x1xuIyAJ2PCGlBX1lH2Y.exeexplorer.exe
User:
admin
Company:
PROSTERNUM10
Integrity Level:
MEDIUM
Description:
distrustingly
Exit code:
0
Version:
1.08.0005
2556"C:\Users\admin\AppData\Local\Temp\dwwpQzThss7BXhWUbepfSu2ox.exe" C:\Users\admin\AppData\Local\Temp\dwwpQzThss7BXhWUbepfSu2ox.exe
explorer.exe
User:
admin
Company:
evaporometer
Integrity Level:
MEDIUM
Description:
Annalen
Exit code:
0
Version:
3.3.6.4
3480"C:\Users\admin\AppData\Local\Temp\au4T6j7hTuRnPR5SZTr6eSg6R.exe" C:\Users\admin\AppData\Local\Temp\au4T6j7hTuRnPR5SZTr6eSg6R.exeexplorer.exe
User:
admin
Company:
efurojovobemuj
Integrity Level:
MEDIUM
Description:
uxowigivez
Exit code:
0
Version:
9.14.19.24
2336"C:\Users\admin\AppData\Local\Temp\eKK9QZTIl443XGz8wu265cwR6.exe" C:\Users\admin\AppData\Local\Temp\eKK9QZTIl443XGz8wu265cwR6.exeexplorer.exe
User:
admin
Company:
ofosoteyohijicuyunom
Integrity Level:
MEDIUM
Description:
ijehehih
Version:
4.5.7.9
2056C:\Users\admin\AppData\Local\Temp\Wda65x1xuIyAJ2PCGlBX1lH2Y.exe" C:\Users\admin\AppData\Local\Temp\Wda65x1xuIyAJ2PCGlBX1lH2Y.exeWda65x1xuIyAJ2PCGlBX1lH2Y.exe
User:
admin
Company:
PROSTERNUM10
Integrity Level:
MEDIUM
Description:
distrustingly
Exit code:
0
Version:
1.08.0005
3584"C:\Users\admin\AppData\Local\Temp\dwwpQzThss7BXhWUbepfSu2ox.exe" C:\Users\admin\AppData\Local\Temp\dwwpQzThss7BXhWUbepfSu2ox.exe
dwwpQzThss7BXhWUbepfSu2ox.exe
User:
admin
Company:
evaporometer
Integrity Level:
MEDIUM
Description:
Annalen
Exit code:
0
Version:
3.3.6.4
2772"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\AppData\Local\Temp\au4T6j7hTuRnPR5SZTr6eSg6R.exe:Zone.Identifier"C:\Windows\System32\cmd.exeau4T6j7hTuRnPR5SZTr6eSg6R.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
659
Read events
544
Write events
114
Delete events
1

Modification events

(PID) Process:(3100) powershell.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3100) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3100) powershell.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2968) iopl.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2968) iopl.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2968) iopl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iopl_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2968) iopl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iopl_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2968) iopl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iopl_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2968) iopl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iopl_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(2968) iopl.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\iopl_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
58
Suspicious files
2
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
3100powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R47M8M6K361DRHYX9W22.temp
MD5:
SHA256:
2968iopl.exeC:\Users\admin\AppData\Local\Temp\au4T6j7hTuRnPR5SZTr6eSg6R.exeexecutable
MD5:B56FFC613CC952CD5F190331A6B92CFF
SHA256:24D9791DCF78470AE04900EFEBF8F16CF30F7F3BF8824C0C8B357CC57EB03768
2968iopl.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019071120190712\index.datdat
MD5:19A6E04D1F411ED92B5B6D1E1307CCAD
SHA256:6B56095FD77A970940DCECC2CD5EBE6D38B70F7E619D8917FEDAF475EE178EA2
3100powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF100b0e.TMPbinary
MD5:4B92A079D7F4DFA0DFE9125E60FE7814
SHA256:E96B52BC25AE8BA162760C1F5159606ED78EB1EC4CBA0F98AAD2915AE22D8E04
2968iopl.exeC:\Users\admin\AppData\Local\Temp\dwwpQzThss7BXhWUbepfSu2ox.exeexecutable
MD5:01C36962C6080C4F91E2DF0C1C1AD935
SHA256:27A323D4A2158F76A4E4E27F5E45549963E5A192196EC4C0F8859A5CF4C3B646
3100powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:4B92A079D7F4DFA0DFE9125E60FE7814
SHA256:E96B52BC25AE8BA162760C1F5159606ED78EB1EC4CBA0F98AAD2915AE22D8E04
2968iopl.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.datdat
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862
SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A
3100powershell.exeC:\Users\Public\iopl.exeexecutable
MD5:2244283161322DA4D7790944ABAFC44D
SHA256:613282B5950002066B84FC5A0FEBA6C8045E83A336C474A3AA24263F3A29CBA3
2968iopl.exeC:\Users\admin\AppData\Local\Temp\Wda65x1xuIyAJ2PCGlBX1lH2Y.exeexecutable
MD5:56335A844C5E8833170524D97A01B571
SHA256:F80A7107EF8BEBD717297AAF2427C405B4809284537F95CA7067FA6122FBE2FA
2968iopl.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\kanorgate[1].phptext
MD5:936052F95D5AF43B58CBFF3EB7B864F7
SHA256:41DBC39AC7750D7C7AD5022B276BCBF2FC9F1A13828F22C1000F71937B4DF3A7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
7
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
GET
200
188.246.233.25:80
http://fdghdf344.ru/winidsi34dfg_signed.exe
RU
executable
556 Kb
malicious
2968
iopl.exe
GET
200
188.246.233.25:80
http://fdghdf344.ru/gz/kanorgate.php?g=-994429369&k=ij8qpGocMAju06bXEjoLA1Fz9
RU
text
1.29 Mb
malicious
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
POST
200
188.246.233.25:80
http://fdghdf344.ru/index.php
RU
binary
4.28 Mb
malicious
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
GET
200
188.246.233.25:80
http://fdghdf344.ru/rfds34hfgdf34.exe
RU
executable
482 Kb
malicious
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
GET
200
188.246.233.25:80
http://fdghdf344.ru/a2nw234efg354_signed.exe
RU
executable
359 Kb
malicious
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
POST
200
188.246.233.25:80
http://fdghdf344.ru/index.php
RU
text
2 b
malicious
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
GET
200
188.246.233.25:80
http://fdghdf344.ru/rfsd543fg354gdf_signed.exe
RU
executable
338 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
188.246.233.25:80
fdghdf344.ru
Kassir, Ltd.
RU
malicious
2968
iopl.exe
188.246.233.25:80
fdghdf344.ru
Kassir, Ltd.
RU
malicious

DNS requests

Domain
IP
Reputation
shell.view
unknown
fdghdf344.ru
  • 188.246.233.25
malicious

Threats

PID
Process
Class
Message
2968
iopl.exe
A Network Trojan was detected
MALWARE [PTsecurity] Godzilla Loader
2968
iopl.exe
A Network Trojan was detected
MALWARE [PTsecurity] Godzilla Loader C2 Response
2968
iopl.exe
A Network Trojan was detected
ET TROJAN Windows executable base64 encoded
2968
iopl.exe
Misc activity
SUSPICIOUS [PTsecurity] Executable base64 Payload hide in HTML content
2968
iopl.exe
Misc activity
SUSPICIOUS [PTsecurity] Executable base64 Payload
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Request
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
A Network Trojan was detected
AV TROJAN AZOrult++ CnC Response
3584
dwwpQzThss7BXhWUbepfSu2ox.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult Response
2 ETPRO signatures available at the full report
Process
Message
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll
dwwpQzThss7BXhWUbepfSu2ox.exe
User32.dll