File name:

Attachement_21000002136572540682154387540346723.img

Full analysis: https://app.any.run/tasks/11af5161-0968-4596-be21-f8c2fe18f992
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: July 18, 2019, 01:03:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
azorult
Indicators:
MIME: application/x-iso9660-image
File info: UDF filesystem data (version 1.5) 'DESKTOP'
MD5:

71A0D311DA42DBF96308658924AE3533

SHA1:

98C3EA72B6187400B04376D57E46754C74307006

SHA256:

A8067B03EC32DC5F5A21CB6DB6CB8BEBA43AA0E3FB7070D5EADD75599EF37856

SSDEEP:

6144:4ThuF1UxvtV/Z3bmzW6CBOruTBVKQB3CzGMuU6c8bsU5DQwhEgPbbBt+JsZBx30T:WJbmzW6CIr2DV3CqW6eCkXYbXcsZnE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Attachement_21000002136572540682154387540346723.exe (PID: 2360)
      • Attachement_21000002136572540682154387540346723.exe (PID: 3216)
      • asfasddsfasf.exe (PID: 4044)
      • Attachement_21000002136572540682154387540346723.exe (PID: 2776)
      • asfasddsfasf.exe (PID: 3372)
      • Attachement_21000002136572540682154387540346723.exe (PID: 2940)
      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
    • AZORULT was detected

      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
    • Changes the autorun value in the registry

      • asfasddsfasf.exe (PID: 4044)
    • Actions looks like stealing of personal data

      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
    • Connects to CnC server

      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
    • Loads dropped or rewritten executable

      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3956)
      • cmd.exe (PID: 2032)
      • cmd.exe (PID: 1664)
      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
    • Creates files in the user directory

      • cmd.exe (PID: 2032)
      • cmd.exe (PID: 1664)
    • Starts CMD.EXE for commands execution

      • Attachement_21000002136572540682154387540346723.exe (PID: 2360)
      • asfasddsfasf.exe (PID: 4044)
      • Attachement_21000002136572540682154387540346723.exe (PID: 2776)
      • Attachement_21000002136572540682154387540346723.exe (PID: 3216)
      • asfasddsfasf.exe (PID: 3372)
      • asfasddsfasf.exe (PID: 4076)
      • asfasddsfasf.exe (PID: 2576)
      • Attachement_21000002136572540682154387540346723.exe (PID: 2940)
    • Application launched itself

      • asfasddsfasf.exe (PID: 4044)
      • asfasddsfasf.exe (PID: 3372)
    • Reads the cookies of Google Chrome

      • asfasddsfasf.exe (PID: 4076)
      • asfasddsfasf.exe (PID: 2576)
    • Reads the cookies of Mozilla Firefox

      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
    • Starts CMD.EXE for self-deleting

      • asfasddsfasf.exe (PID: 2576)
      • asfasddsfasf.exe (PID: 4076)
  • INFO

    • Modifies the open verb of a shell class

      • rundll32.exe (PID: 3684)
    • Manual execution by user

      • Attachement_21000002136572540682154387540346723.exe (PID: 2360)
      • Attachement_21000002136572540682154387540346723.exe (PID: 2776)
      • Attachement_21000002136572540682154387540346723.exe (PID: 3216)
      • Attachement_21000002136572540682154387540346723.exe (PID: 2940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.atn | Photoshop Action (37.5)
.gmc | Game Music Creator Music (8.4)
.abr | Adobe PhotoShop Brush (7.5)

EXIF

ISO

VolumeName: DESKTOP
VolumeBlockCount: 599
VolumeBlockSize: 2048
RootDirectoryCreateDate: 2019:07:17 15:26:18+01:00
VolumeSetName: UNDEFINED
Software: IMGBURN V2.5.8.0 - THE ULTIMATE IMAGE BURNER!
VolumeCreateDate: 2019:07:17 15:26:18.00+01:00
VolumeModifyDate: 2019:07:17 15:26:18.00+01:00

Composite

VolumeSize: 1198 kB
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
90
Monitored processes
30
Malicious processes
8
Suspicious processes
2

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winrar.exe attachement_21000002136572540682154387540346723.exe no specs cmd.exe no specs cmd.exe no specs attachement_21000002136572540682154387540346723.exe cmd.exe cmd.exe no specs cmd.exe no specs attachement_21000002136572540682154387540346723.exe no specs cmd.exe cmd.exe no specs asfasddsfasf.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs asfasddsfasf.exe no specs attachement_21000002136572540682154387540346723.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs #AZORULT asfasddsfasf.exe #AZORULT asfasddsfasf.exe cmd.exe no specs timeout.exe no specs cmd.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
880C:\Windows\system32\timeout.exe 3 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
1064"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier"C:\Windows\System32\cmd.exeAttachement_21000002136572540682154387540346723.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1228"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe:Zone.Identifier"C:\Windows\System32\cmd.exeasfasddsfasf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1228"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier"C:\Windows\System32\cmd.exeAttachement_21000002136572540682154387540346723.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\imm32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
1664"C:\Windows\System32\cmd.exe" /c copy "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe" "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe"C:\Windows\System32\cmd.exe
Attachement_21000002136572540682154387540346723.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2032"C:\Windows\System32\cmd.exe" /c copy "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe" "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe"C:\Windows\System32\cmd.exe
Attachement_21000002136572540682154387540346723.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2100"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "asfasddsfasf.exe"C:\Windows\system32\cmd.exeasfasddsfasf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2168"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier"C:\Windows\System32\cmd.exeAttachement_21000002136572540682154387540346723.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2252"C:\Windows\System32\cmd.exe" /c, "C:\Users\admin\AppData\Roaming\asfasddsfasf.exe"C:\Windows\System32\cmd.exeAttachement_21000002136572540682154387540346723.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2256"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exe:Zone.Identifier"C:\Windows\System32\cmd.exeAttachement_21000002136572540682154387540346723.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
1 811
Read events
1 601
Write events
209
Delete events
1

Modification events

(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
Operation:writeName:@C:\Windows\System32\isoburn.exe,-350
Value:
Disc Image File
(PID) Process:(3684) rundll32.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.img\OpenWithProgids
Operation:writeName:Windows.IsoFile
Value:
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\system32\NOTEPAD.EXE
Value:
Notepad
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\PROGRA~1\MICROS~1\Office14\OIS.EXE
Value:
Microsoft Office 2010
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Value:
Microsoft Word
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
0100000000000000020000000700000006000000030000000500000004000000FFFFFFFF
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\35\Shell
Operation:writeName:SniffedFolderType
Value:
Generic
(PID) Process:(3684) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1
Operation:writeName:4
Value:
50003100000000001C4D655F100057696E52415200003A0008000400EFBE1C4DBC5E1C4D655F2A0000000AC1000000000C000000000000000000000000000000570069006E00520041005200000016000000
Executable files
83
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2032cmd.exeC:\Users\admin\AppData\Roaming\asfasddsfasf.exeexecutable
MD5:
SHA256:
3956WinRAR.exeC:\Users\admin\Desktop\Attachement_21000002136572540682154387540346723.exeexecutable
MD5:
SHA256:
1664cmd.exeC:\Users\admin\AppData\Roaming\asfasddsfasf.exeexecutable
MD5:
SHA256:
2576asfasddsfasf.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-memory-l1-1-0.dllexecutable
MD5:D500D9E24F33933956DF0E26F087FD91
SHA256:BB33A9E906A5863043753C44F6F8165AFE4D5EDB7E55EFA4C7E6E1ED90778ECA
2576asfasddsfasf.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:502263C56F931DF8440D7FD2FA7B7C00
SHA256:94A5DF1227818EDBFD0D5091C6A48F86B4117C38550343F780C604EEE1CD6231
2576asfasddsfasf.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:6D778E83F74A4C7FE4C077DC279F6867
SHA256:A97DCCA76CDB12E985DFF71040815F28508C655AB2B073512E386DD63F4DA325
2576asfasddsfasf.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:88FF191FD8648099592ED28EE6C442A5
SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
2576asfasddsfasf.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CB978304B79EF53962408C611DFB20F5
SHA256:90FAE0E7C3644A6754833C42B0AC39B6F23859F9A7CF4B6C8624820F59B9DAD3
2576asfasddsfasf.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-processthreads-l1-1-1.dllexecutable
MD5:D0289835D97D103BAD0DD7B9637538A1
SHA256:91EEB842973495DEB98CEF0377240D2F9C3D370AC4CF513FD215857E9F265A6A
2576asfasddsfasf.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-processthreads-l1-1-0.dllexecutable
MD5:A2D7D7711F9C0E3E065B2929FF342666
SHA256:9DAB884071B1F7D7A167F9BEC94BA2BEE875E3365603FA29B31DE286C6A97A1D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
3
DNS requests
2
Threats
23

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4076
asfasddsfasf.exe
POST
200
202.52.147.109:80
http://lawantumorotak.com/img/index.php
ID
binary
4.27 Mb
malicious
2576
asfasddsfasf.exe
POST
200
202.52.147.109:80
http://lawantumorotak.com/img/index.php
ID
text
2 b
malicious
4076
asfasddsfasf.exe
POST
200
202.52.147.109:80
http://lawantumorotak.com/img/index.php
ID
text
2 b
malicious
2576
asfasddsfasf.exe
POST
200
202.52.147.109:80
http://lawantumorotak.com/img/index.php
ID
binary
4.27 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2576
asfasddsfasf.exe
202.52.147.109:80
lawantumorotak.com
Global Media Teknologi, PT
ID
suspicious
4076
asfasddsfasf.exe
202.52.147.109:80
lawantumorotak.com
Global Media Teknologi, PT
ID
suspicious

DNS requests

Domain
IP
Reputation
lawantumorotak.com
  • 202.52.147.109
malicious

Threats

PID
Process
Class
Message
2576
asfasddsfasf.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
2576
asfasddsfasf.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
2576
asfasddsfasf.exe
A Network Trojan was detected
AV TROJAN AZORult CnC Beacon
2576
asfasddsfasf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
2576
asfasddsfasf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
2576
asfasddsfasf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult encrypted PE file
4076
asfasddsfasf.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
4076
asfasddsfasf.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
4076
asfasddsfasf.exe
A Network Trojan was detected
AV TROJAN AZORult CnC Beacon
4076
asfasddsfasf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
4 ETPRO signatures available at the full report
No debug info