| File name: | Attachement_21000002136572540682154387540346723.img |
| Full analysis: | https://app.any.run/tasks/11af5161-0968-4596-be21-f8c2fe18f992 |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | July 18, 2019, 01:03:26 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-iso9660-image |
| File info: | UDF filesystem data (version 1.5) 'DESKTOP' |
| MD5: | 71A0D311DA42DBF96308658924AE3533 |
| SHA1: | 98C3EA72B6187400B04376D57E46754C74307006 |
| SHA256: | A8067B03EC32DC5F5A21CB6DB6CB8BEBA43AA0E3FB7070D5EADD75599EF37856 |
| SSDEEP: | 6144:4ThuF1UxvtV/Z3bmzW6CBOruTBVKQB3CzGMuU6c8bsU5DQwhEgPbbBt+JsZBx30T:WJbmzW6CIr2DV3CqW6eCkXYbXcsZnE |
| .atn | | | Photoshop Action (37.5) |
|---|---|---|
| .gmc | | | Game Music Creator Music (8.4) |
| .abr | | | Adobe PhotoShop Brush (7.5) |
| VolumeName: | DESKTOP |
|---|---|
| VolumeBlockCount: | 599 |
| VolumeBlockSize: | 2048 |
| RootDirectoryCreateDate: | 2019:07:17 15:26:18+01:00 |
| VolumeSetName: | UNDEFINED |
| Software: | IMGBURN V2.5.8.0 - THE ULTIMATE IMAGE BURNER! |
| VolumeCreateDate: | 2019:07:17 15:26:18.00+01:00 |
| VolumeModifyDate: | 2019:07:17 15:26:18.00+01:00 |
| VolumeSize: | 1198 kB |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 880 | C:\Windows\system32\timeout.exe 3 | C:\Windows\system32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1064 | "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier" | C:\Windows\System32\cmd.exe | — | Attachement_21000002136572540682154387540346723.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1228 | "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe:Zone.Identifier" | C:\Windows\System32\cmd.exe | — | asfasddsfasf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1228 | "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier" | C:\Windows\System32\cmd.exe | — | Attachement_21000002136572540682154387540346723.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1664 | "C:\Windows\System32\cmd.exe" /c copy "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe" "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe" | C:\Windows\System32\cmd.exe | Attachement_21000002136572540682154387540346723.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2032 | "C:\Windows\System32\cmd.exe" /c copy "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe" "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe" | C:\Windows\System32\cmd.exe | Attachement_21000002136572540682154387540346723.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2100 | "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "asfasddsfasf.exe" | C:\Windows\system32\cmd.exe | — | asfasddsfasf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2168 | "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier" | C:\Windows\System32\cmd.exe | — | Attachement_21000002136572540682154387540346723.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2252 | "C:\Windows\System32\cmd.exe" /c, "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe" | C:\Windows\System32\cmd.exe | — | Attachement_21000002136572540682154387540346723.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2256 | "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier" | C:\Windows\System32\cmd.exe | — | Attachement_21000002136572540682154387540346723.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E |
| Operation: | write | Name: | @C:\Windows\System32\isoburn.exe,-350 |
Value: Disc Image File | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.img\OpenWithProgids |
| Operation: | write | Name: | Windows.IsoFile |
Value: | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Windows\system32\NOTEPAD.EXE |
Value: Notepad | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\PROGRA~1\MICROS~1\Office14\OIS.EXE |
Value: Microsoft Office 2010 | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
| Operation: | write | Name: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Value: Microsoft Word | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | NodeSlots |
Value: 020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202 | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU |
| Operation: | write | Name: | MRUListEx |
Value: 0100000000000000020000000700000006000000030000000500000004000000FFFFFFFF | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\35\Shell |
| Operation: | write | Name: | SniffedFolderType |
Value: Generic | |||
| (PID) Process: | (3684) rundll32.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 |
| Operation: | write | Name: | 4 |
Value: 50003100000000001C4D655F100057696E52415200003A0008000400EFBE1C4DBC5E1C4D655F2A0000000AC1000000000C000000000000000000000000000000570069006E00520041005200000016000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2032 | cmd.exe | C:\Users\admin\AppData\Roaming\asfasddsfasf.exe | executable | |
MD5:— | SHA256:— | |||
| 3956 | WinRAR.exe | C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe | executable | |
MD5:— | SHA256:— | |||
| 1664 | cmd.exe | C:\Users\admin\AppData\Roaming\asfasddsfasf.exe | executable | |
MD5:— | SHA256:— | |||
| 2576 | asfasddsfasf.exe | C:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-memory-l1-1-0.dll | executable | |
MD5:D500D9E24F33933956DF0E26F087FD91 | SHA256:BB33A9E906A5863043753C44F6F8165AFE4D5EDB7E55EFA4C7E6E1ED90778ECA | |||
| 2576 | asfasddsfasf.exe | C:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-console-l1-1-0.dll | executable | |
MD5:502263C56F931DF8440D7FD2FA7B7C00 | SHA256:94A5DF1227818EDBFD0D5091C6A48F86B4117C38550343F780C604EEE1CD6231 | |||
| 2576 | asfasddsfasf.exe | C:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-errorhandling-l1-1-0.dll | executable | |
MD5:6D778E83F74A4C7FE4C077DC279F6867 | SHA256:A97DCCA76CDB12E985DFF71040815F28508C655AB2B073512E386DD63F4DA325 | |||
| 2576 | asfasddsfasf.exe | C:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-debug-l1-1-0.dll | executable | |
MD5:88FF191FD8648099592ED28EE6C442A5 | SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D | |||
| 2576 | asfasddsfasf.exe | C:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-datetime-l1-1-0.dll | executable | |
MD5:CB978304B79EF53962408C611DFB20F5 | SHA256:90FAE0E7C3644A6754833C42B0AC39B6F23859F9A7CF4B6C8624820F59B9DAD3 | |||
| 2576 | asfasddsfasf.exe | C:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-processthreads-l1-1-1.dll | executable | |
MD5:D0289835D97D103BAD0DD7B9637538A1 | SHA256:91EEB842973495DEB98CEF0377240D2F9C3D370AC4CF513FD215857E9F265A6A | |||
| 2576 | asfasddsfasf.exe | C:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-processthreads-l1-1-0.dll | executable | |
MD5:A2D7D7711F9C0E3E065B2929FF342666 | SHA256:9DAB884071B1F7D7A167F9BEC94BA2BEE875E3365603FA29B31DE286C6A97A1D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4076 | asfasddsfasf.exe | POST | 200 | 202.52.147.109:80 | http://lawantumorotak.com/img/index.php | ID | binary | 4.27 Mb | malicious |
2576 | asfasddsfasf.exe | POST | 200 | 202.52.147.109:80 | http://lawantumorotak.com/img/index.php | ID | text | 2 b | malicious |
4076 | asfasddsfasf.exe | POST | 200 | 202.52.147.109:80 | http://lawantumorotak.com/img/index.php | ID | text | 2 b | malicious |
2576 | asfasddsfasf.exe | POST | 200 | 202.52.147.109:80 | http://lawantumorotak.com/img/index.php | ID | binary | 4.27 Mb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2576 | asfasddsfasf.exe | 202.52.147.109:80 | lawantumorotak.com | Global Media Teknologi, PT | ID | suspicious |
4076 | asfasddsfasf.exe | 202.52.147.109:80 | lawantumorotak.com | Global Media Teknologi, PT | ID | suspicious |
Domain | IP | Reputation |
|---|---|---|
lawantumorotak.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
2576 | asfasddsfasf.exe | A Network Trojan was detected | ET TROJAN AZORult Variant.4 Checkin M2 |
2576 | asfasddsfasf.exe | A Network Trojan was detected | AV TROJAN Azorult CnC Beacon |
2576 | asfasddsfasf.exe | A Network Trojan was detected | AV TROJAN AZORult CnC Beacon |
2576 | asfasddsfasf.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult client request |
2576 | asfasddsfasf.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult.Stealer HTTP Header |
2576 | asfasddsfasf.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult encrypted PE file |
4076 | asfasddsfasf.exe | A Network Trojan was detected | ET TROJAN AZORult Variant.4 Checkin M2 |
4076 | asfasddsfasf.exe | A Network Trojan was detected | AV TROJAN Azorult CnC Beacon |
4076 | asfasddsfasf.exe | A Network Trojan was detected | AV TROJAN AZORult CnC Beacon |
4076 | asfasddsfasf.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult client request |