| File name: | MUH030425.exe |
| Full analysis: | https://app.any.run/tasks/85bf7912-fea4-4a73-b94d-c62f93b9cfb1 |
| Verdict: | Malicious activity |
| Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
| Analysis date: | March 04, 2025, 08:39:42 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | 7958C012F2EFC42CC7FF436D3377ABCC |
| SHA1: | D854A2CB11B56D64DD7F87EE91EA47F305CE82BF |
| SHA256: | B5C538F89CA2E3D9A8085BC387D85F7F50E9470975FFEC25FE040C26226BECCB |
| SSDEEP: | 49152:dAVaKZ0AeijfdOpeqKZbA6JaZR9mFgRfROrFdVMFo7Qwq7t2IfLeBc7izkezef3+:dcaK2PaiFKZbABZR7irRMG7tq52INizl |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21.3) |
| .scr | | | Windows screen saver (10.1) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:03:04 08:03:06+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 1621504 |
| InitializedDataSize: | 34304 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x18dd8a |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.3.2.0 |
| ProductVersionNumber: | 1.3.2.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | InSim packet sniffer for the racing simulator Live for Speed |
| CompanyName: | - |
| FileDescription: | InSimSniffer |
| FileVersion: | 1.3.2.0 |
| InternalName: | pixuBt.exe |
| LegalCopyright: | Copyright © Alex McBride 2009 - 2012 |
| LegalTrademarks: | - |
| OriginalFileName: | pixuBt.exe |
| ProductName: | InSimSniffer |
| ProductVersion: | 1.3.2.0 |
| AssemblyVersion: | 1.3.2.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 664 | "C:\WINDOWS\system32\cmd.exe" /c C:\WINDOWS\system32\timeout.exe 3 & del "RegSvcs.exe" | C:\Windows\SysWOW64\cmd.exe | — | RegSvcs.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1020 | "C:\Users\admin\Desktop\MUH030425.exe" | C:\Users\admin\Desktop\MUH030425.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: InSimSniffer Exit code: 3762504530 Version: 1.3.2.0 Modules
| |||||||||||||||
| 1180 | "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBBaygjR" /XML "C:\Users\admin\AppData\Local\Temp\tmp6109.tmp" | C:\Windows\SysWOW64\schtasks.exe | — | MUH030425.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2268 | C:\WINDOWS\system32\timeout.exe 3 | C:\Windows\SysWOW64\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4268 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1020 -s 1852 | C:\Windows\SysWOW64\WerFault.exe | — | MUH030425.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6132 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6388 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6752 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7152 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe | MUH030425.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Services Installation Utility Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
azorult(PID) Process(7152) RegSvcs.exe Hostshttp://k1d5.icu/TP341/index.php | |||||||||||||||
| (PID) Process: | (7152) RegSvcs.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (7152) RegSvcs.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (7152) RegSvcs.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4268 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MUH030425.exe_1db42179d057652d3e28b63f8b6b7dee6f9cb85_2bfe8698_e460f056-f8df-46f0-af0e-a477bede7cc5\Report.wer | — | |
MD5:— | SHA256:— | |||
| 4268 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\MUH030425.exe.1020.dmp | — | |
MD5:— | SHA256:— | |||
| 1020 | MUH030425.exe | C:\Users\admin\AppData\Local\Temp\tmp6109.tmp | xml | |
MD5:7AA6E325FB4AE0672B4B0C1E8FA170E1 | SHA256:CA60EDC9C456F26450894B55A75DA624198F9E4650EA265E42C3D36ABB228797 | |||
| 7152 | RegSvcs.exe | C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe | executable | |
MD5:BA7F11A5E1A2D13A17124C118701AD91 | SHA256:866F5B324D7C53D0956EA4100FAF50CB99B6C3B254B8803A11F8D5C37005D296 | |||
| 4268 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER6772.tmp.WERInternalMetadata.xml | binary | |
MD5:79334BDF34A9AC973292A78F15CC18CB | SHA256:0CBCA17CFB0D0423E8E891F09996DCE2065B315F3295AF56A2825C7A4C4EC9E4 | |||
| 7152 | RegSvcs.exe | C:\Users\admin\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:902803D53A5035D74A00B96F93069AC2 | SHA256:196BAA02998C22643F368983026387F5A549E978BBB04E499739FD3EF14E9455 | |||
| 7152 | RegSvcs.exe | C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe | executable | |
MD5:4E07F7313810911920F36B20A7085911 | SHA256:76DF4333CB48E4B5A5CA200323AE98A4D8BECD47EC7E02FAB7164234A56F65F4 | |||
| 7152 | RegSvcs.exe | C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe | executable | |
MD5:4C2D48876698F2E429FDBFB87CA93423 | SHA256:64BAFD663D1313F68F7B641A43671D3A236D45274A7A035009959DC0A5B2091A | |||
| 7152 | RegSvcs.exe | C:\Users\admin\AppData\Local\Temp\0693739D\api-ms-win-core-file-l1-2-0.dll | executable | |
MD5:E2F648AE40D234A3892E1455B4DBBE05 | SHA256:C8C499B012D0D63B7AFC8B4CA42D6D996B2FCF2E8B5F94CACFBEC9E6F33E8A03 | |||
| 7152 | RegSvcs.exe | C:\Users\admin\AppData\Local\Temp\0693739D\api-ms-win-core-debug-l1-1-0.dll | executable | |
MD5:88FF191FD8648099592ED28EE6C442A5 | SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
7152 | RegSvcs.exe | POST | 200 | 54.244.188.177:80 | http://pywolwnvd.biz/w | unknown | — | — | malicious |
7152 | RegSvcs.exe | POST | 200 | 104.21.16.1:80 | http://k1d5.icu/TP341/index.php | unknown | — | — | malicious |
7152 | RegSvcs.exe | POST | 200 | 18.141.10.107:80 | http://ssbzmoy.biz/as | unknown | — | — | malicious |
7152 | RegSvcs.exe | POST | 200 | 44.221.84.105:80 | http://npukfztj.biz/heyfomqfqb | unknown | — | — | malicious |
7152 | RegSvcs.exe | POST | 302 | 72.52.178.23:80 | http://przvgke.biz/rcqfmuue | unknown | — | — | unknown |
7152 | RegSvcs.exe | POST | 200 | 104.21.16.1:80 | http://k1d5.icu/TP341/index.php | unknown | — | — | malicious |
7152 | RegSvcs.exe | POST | 200 | 54.244.188.177:80 | http://cvgrf.biz/ndai | unknown | — | — | malicious |
7152 | RegSvcs.exe | GET | 200 | 13.248.148.254:80 | http://ww12.przvgke.biz/rcqfmuue?usid=26&utid=11017518076 | unknown | — | — | unknown |
7152 | RegSvcs.exe | POST | 302 | 72.52.178.23:80 | http://przvgke.biz/gthkbjvdpmebnlo | unknown | — | — | unknown |
7152 | RegSvcs.exe | GET | 200 | 13.248.148.254:80 | http://ww12.przvgke.biz/gthkbjvdpmebnlo?usid=26&utid=11017518382 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
7152 | RegSvcs.exe | 104.21.16.1:80 | k1d5.icu | CLOUDFLARENET | — | malicious |
7152 | RegSvcs.exe | 54.244.188.177:80 | pywolwnvd.biz | AMAZON-02 | US | malicious |
7152 | RegSvcs.exe | 18.141.10.107:80 | ssbzmoy.biz | AMAZON-02 | SG | malicious |
7152 | RegSvcs.exe | 44.221.84.105:80 | npukfztj.biz | AMAZON-AES | US | malicious |
7152 | RegSvcs.exe | 72.52.178.23:80 | przvgke.biz | LIQUIDWEB | US | unknown |
7152 | RegSvcs.exe | 13.248.148.254:80 | ww12.przvgke.biz | AMAZON-02 | US | unknown |
780 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
k1d5.icu |
| malicious |
pywolwnvd.biz |
| malicious |
ssbzmoy.biz |
| malicious |
cvgrf.biz |
| malicious |
npukfztj.biz |
| malicious |
przvgke.biz |
| unknown |
ww12.przvgke.biz |
| unknown |
zlenh.biz |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .icu Domain |
7152 | RegSvcs.exe | Malware Command and Control Activity Detected | ET MALWARE Win32/AZORult V3.3 Client Checkin M15 |
7152 | RegSvcs.exe | Malware Command and Control Activity Detected | ET MALWARE AZORult v3.3 Server Response M2 |
7152 | RegSvcs.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
7152 | RegSvcs.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
7152 | RegSvcs.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
7152 | RegSvcs.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
7152 | RegSvcs.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz |
7152 | RegSvcs.exe | A Network Trojan was detected | ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst |
2196 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) |