analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Purchase.exe

Full analysis: https://app.any.run/tasks/3cfadd9b-ff61-473a-ac39-f4d728a0f642
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: September 30, 2020, 06:42:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
trojan
rat
azorult
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

B731A6C7110D0ED272E977BABAA204F6

SHA1:

90A7FC73FDCBF4D51AF667818BA4B22F15D6634A

SHA256:

DA6D45FD39478C021900718F516197EC10FCA556936A3960E13E787BDDA1B5EA

SSDEEP:

6144:r2GhNafuzces6tYAG5zyAHax1XOnJyut/u7b2PBCb+/MsqwltKAibwc8Np5:r2iNaGzKZYkm+UxPsZw1wv1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to CnC server

      • Purchase.exe (PID: 2812)
    • AZORULT was detected

      • Purchase.exe (PID: 2812)
    • Loads dropped or rewritten executable

      • Purchase.exe (PID: 2812)
    • Actions looks like stealing of personal data

      • Purchase.exe (PID: 2812)
  • SUSPICIOUS

    • Application launched itself

      • Purchase.exe (PID: 952)
    • Reads Internet Cache Settings

      • Purchase.exe (PID: 2812)
    • Executable content was dropped or overwritten

      • Purchase.exe (PID: 2812)
    • Reads the cookies of Mozilla Firefox

      • Purchase.exe (PID: 2812)
    • Reads the cookies of Google Chrome

      • Purchase.exe (PID: 2812)
  • INFO

    • Manual execution by user

      • WINWORD.EXE (PID: 3716)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3716)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3716)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

AssemblyVersion: 5.1.2.5
ProductVersion: 5.1.2.5
ProductName: Nvidia Co
OriginalFileName: Telegram.exe
LegalCopyright: Nvidia
InternalName: Telegram.exe
FileVersion: 5.1.2.5
FileDescription: Nvidia Corp
CompanyName: Nvidia
Comments: Nvidia Corp
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 5.1.2.5
FileVersionNumber: 5.1.2.5
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x54a2e
UninitializedDataSize: -
InitializedDataSize: 211968
CodeSize: 338944
LinkerVersion: 48
PEType: PE32
TimeStamp: 2020:05:04 14:38:58+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 04-May-2020 12:38:58
Comments: Nvidia Corp
CompanyName: Nvidia
FileDescription: Nvidia Corp
FileVersion: 5.1.2.5
InternalName: Telegram.exe
LegalCopyright: Nvidia
OriginalFilename: Telegram.exe
ProductName: Nvidia Co
ProductVersion: 5.1.2.5
Assembly Version: 5.1.2.5

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 04-May-2020 12:38:58
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x00052A34
0x00052C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.41677
.rsrc
0x00056000
0x0003397C
0x00033A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.27468
.reloc
0x0008A000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.00112
490
Latin 1 / Western European
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start purchase.exe no specs winword.exe no specs #AZORULT purchase.exe

Process information

PID
CMD
Path
Indicators
Parent process
952"C:\Users\admin\AppData\Local\Temp\Purchase.exe" C:\Users\admin\AppData\Local\Temp\Purchase.exeexplorer.exe
User:
admin
Company:
Nvidia
Integrity Level:
MEDIUM
Description:
Nvidia Corp
Exit code:
0
Version:
5.1.2.5
3716"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\pathavailable.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
2812"C:\Users\admin\AppData\Local\Temp\Purchase.exe"C:\Users\admin\AppData\Local\Temp\Purchase.exe
Purchase.exe
User:
admin
Company:
Nvidia
Integrity Level:
MEDIUM
Description:
Nvidia Corp
Exit code:
0
Version:
5.1.2.5
Total events
1 126
Read events
810
Write events
0
Delete events
0

Modification events

No data
Executable files
48
Suspicious files
0
Text files
2
Unknown types
4

Dropped files

PID
Process
Filename
Type
3716WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR66A.tmp.cvr
MD5:
SHA256:
3716WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EA465DBB-1D0E-499D-9329-6B94C528BE83}.tmp
MD5:
SHA256:
3716WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9672BAA1-98AE-4873-9FAB-2C910B62AC11}.tmp
MD5:
SHA256:
3716WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{8CAC08D8-1A79-4EA9-9449-298CE95DC604}.tmp
MD5:
SHA256:
3716WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\pathavailable.rtf.LNKlnk
MD5:7706CE0E5A8C7D13B394C0D1C435CD0D
SHA256:1BCF625EF53E1A96A34EE345907DD0BDD57506EFBB4F04E1E0FC367E20E51714
3716WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:45A3B22BC4A5DAB9F2DF2EDE96C23459
SHA256:749DA415757EACE0F50BEE5AB26DA2944ACDDBB3715C3D921FEDA53E973A583F
3716WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.datini
MD5:1B40E540CE122425EBFC730C69D6F567
SHA256:5C29DCC6A13FE1888D75D1D82301ADEE540CE404424DEB2530936F8AE38D8380
3716WINWORD.EXEC:\Users\admin\Desktop\~$thavailable.rtfpgc
MD5:AEAED6BCA2D68C0FFC259D03B61E40C0
SHA256:6BB77EEBC583F051BE18F0D25209C926992843A4C7DCFE3AD42A39CC1B3A307A
2812Purchase.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:88FF191FD8648099592ED28EE6C442A5
SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
2812Purchase.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:E479444BDD4AE4577FD32314A68F5D28
SHA256:C85DC081B1964B77D289AAC43CC64746E7B141D036F248A731601EB98F827719
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2812
Purchase.exe
POST
200
198.54.114.189:80
http://adtechsolutions.in/buda/32/index.php
US
binary
4.27 Mb
malicious
2812
Purchase.exe
POST
200
198.54.114.189:80
http://adtechsolutions.in/buda/32/index.php
US
text
2 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2812
Purchase.exe
198.54.114.189:80
adtechsolutions.in
Namecheap, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
adtechsolutions.in
  • 198.54.114.189
malicious

Threats

PID
Process
Class
Message
2812
Purchase.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
2812
Purchase.exe
A Network Trojan was detected
ET TROJAN Win32/AZORult V3.2 Client Checkin M3
2812
Purchase.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
2812
Purchase.exe
A Network Trojan was detected
AV TROJAN AZORult CnC Beacon
2812
Purchase.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult
2812
Purchase.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult v.3
2812
Purchase.exe
A Network Trojan was detected
ET TROJAN AZORult v3.2 Server Response M3
2812
Purchase.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult v.3
2812
Purchase.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
2812
Purchase.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult v.3
2 ETPRO signatures available at the full report
No debug info