File name:

2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe

Full analysis: https://app.any.run/tasks/75f376f3-b869-440a-8e35-6c7ad5e110f8
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: March 25, 2025, 04:50:19
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
azorult
emotet
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

CE1C96A50CB5A0EFAE4803C03689B678

SHA1:

F2ED0A97B6A8A6503ED8247F4ABD5A2E0DCDDCDA

SHA256:

8526F07D31A716E74879A9637B89C33A97C52BD5221A8B5D7BD2452BA46151BD

SSDEEP:

6144:HUu083EfVY8L6CVx1musjuPg0RlSpKVqdddd5GE:HUu73E36C0usS4A80Vqdddd5GE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AZORULT has been detected (SURICATA)

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • EMOTET has been detected (SURICATA)

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • AZORULT mutex has been detected

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • Connects to the CnC server

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
  • SUSPICIOUS

    • Connects to the server without a host name

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • Reads security settings of Internet Explorer

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • Contacting a server suspected of hosting an CnC

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
  • INFO

    • Reads the computer name

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • Checks supported languages

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • The sample compiled with english language support

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • Reads the machine GUID from the registry

      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
    • Reads the software policy settings

      • slui.exe (PID: 4976)
      • slui.exe (PID: 7264)
    • Checks proxy server information

      • slui.exe (PID: 4976)
      • 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe (PID: 300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:08:23 13:06:47+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 69120
InitializedDataSize: 200192
UninitializedDataSize: -
EntryPoint: 0x203e
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 15.1.12.44
ProductVersionNumber: 15.1.12.44
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unknown (04E0)
CompanyName: Store_unit
FileDescription: Chartmeant Technology Finance Partners
FileVersion: 15.1.12.44
LegalTrademarks: Pattern leg Warheld
InternalName: Chartmeant Technology Finance Partners
LegalCopyright: Machine
OriginalFileName: noreach.exe
ProductName: Chartmeant Technology Finance Partners
ProductVersion: 15.1.12.44
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #AZORULT 2019-08-23-follow-malware-from-ursnif-infection-azorult.exe sppextcomobj.exe no specs slui.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\AppData\Local\Temp\2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe" C:\Users\admin\AppData\Local\Temp\2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\2019-08-23-follow-malware-from-ursnif-infection-azorult.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
4976C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7224C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7264"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
7 049
Read events
7 046
Write events
3
Delete events
0

Modification events

(PID) Process:(300) 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(300) 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(300) 2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
49
DNS requests
22
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
300
2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe
POST
404
89.163.242.242:80
http://89.163.242.242/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
300
2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe
89.163.242.242:80
myLoc managed IT AG
DE
malicious
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7892
backgroundTaskHost.exe
20.103.156.88:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6712
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 20.197.71.89
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.140
  • 40.126.32.68
  • 40.126.32.72
  • 20.190.160.67
  • 20.190.160.131
  • 20.190.160.14
whitelisted
arc.msn.com
  • 20.103.156.88
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
  • 2603:1030:800:5::bfee:a08d
whitelisted
241.42.69.40.in-addr.arpa
unknown
d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown
nexusrules.officeapps.live.com
  • 52.111.243.30
whitelisted

Threats

PID
Process
Class
Message
300
2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe
Potentially Bad Traffic
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
300
2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe
Malware Command and Control Activity Detected
ET MALWARE W32/Emotet.v4 Checkin
300
2019-08-23-follow-malware-from-Ursnif-infection-AZORult.exe
Malware Command and Control Activity Detected
ET MALWARE Win32/AZORult V3.3 Client Checkin M15
No debug info