| File name: | Azorult.exe |
| Full analysis: | https://app.any.run/tasks/5649d66d-b8f9-48e3-925f-80fc6f82d1c7 |
| Verdict: | Malicious activity |
| Threats: | Metamorfo is a trojan malware family that has been active since 2018. It remains a top threat, focusing on stealing victims’ financial information, including banking credentials and other data. The malware is known for targeting users in Brazil. |
| Analysis date: | February 13, 2024, 02:33:39 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 5DF0CF8B8AA7E56884F71DA3720FB2C6 |
| SHA1: | 0610E911ADE5D666A45B41F771903170AF58A05A |
| SHA256: | DD396A3F66AD728660023CB116235F3CB1C35D679A155B08EC6A9CCAF966C360 |
| SSDEEP: | 196608:NjIrZDbMLq8TKqTNNRYWzmf1e4Qx/PMPTZPkTGX9sqiL/aVvTAs:N2Z4DRYWXdaZPGy9sJL/aVv/ |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:11:19 10:51:15+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 12 |
| CodeSize: | 581120 |
| InitializedDataSize: | 9926656 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x27f4a |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (British) |
| CharacterSet: | Unicode |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 296 | icacls "C:\Program Files (x86)\AVAST Software" /deny admin:(OI)(CI)(F) | C:\Windows\System32\icacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 296 | schtasks /Delete /TN "GoogleUpdateTaskMachineCore" /F | C:\Windows\System32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 316 | icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F) | C:\Windows\System32\icacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 316 | C:\Windows\system32\cmd.exe /c gpupdate /force | C:\Windows\System32\cmd.exe | — | taskhostw.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 324 | taskkill /f /im Rar.exe | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 480 | C:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN | C:\Windows\System32\cmd.exe | — | Azorult.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 480 | icacls "C:\Windows\Fonts\Mysql" /deny admin:(OI)(CI)(F) | C:\Windows\System32\icacls.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 480 | schtasks /Delete /TN "GoogleUpdateTaskMachineUA" /F | C:\Windows\System32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 532 | C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny %username%:(OI)(CI)(F) | C:\Windows\System32\cmd.exe | — | Azorult.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 552 | C:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny %username%:(OI)(CI)(F) | C:\Windows\System32\cmd.exe | — | Azorult.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList |
| Operation: | write | Name: | John |
Value: 0 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\SOFTWARE\Policies\Microsoft\Windows Defender |
| Operation: | write | Name: | DisableAntiSpyware |
Value: 1 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection |
| Operation: | write | Name: | DisableIOAVProtection |
Value: 1 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection |
| Operation: | write | Name: | DisableBehaviorMonitoring |
Value: 1 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection |
| Operation: | write | Name: | DisableOnAccessProtection |
Value: 1 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection |
| Operation: | write | Name: | DisableRawWriteNotification |
Value: 1 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet |
| Operation: | write | Name: | DisableBlockAltFirstSeen |
Value: 1 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet |
| Operation: | write | Name: | LocalSettingOverrideSpynetRepting |
Value: 0 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet |
| Operation: | write | Name: | SumbitSamplesConsent |
Value: 2 | |||
| (PID) Process: | (3784) Azorult.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions |
| Operation: | write | Name: | Exclusions_Paths |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3784 | Azorult.exe | C:\Programdata\Microsoft\Check\Check.txt | — | |
MD5:— | SHA256:— | |||
| 3784 | Azorult.exe | C:\Programdata\Microsoft\temp\Clean.bat | text | |
MD5:041E144A6429A6926771B0469B901630 | SHA256:1134B862F4D0CE10466742BEB334C06C2386E85ACAD72725DDB1CECB1871B312 | |||
| 3784 | Azorult.exe | C:\Users\admin\AppData\Local\Temp\autF136.tmp | binary | |
MD5:7B5818F70DA8C573F74BE380A6658570 | SHA256:7985A07B0E5795C7DFAC7489B91A9B15CE9C0534DA1FFC2AE385F9FCAEFE92AB | |||
| 3784 | Azorult.exe | C:\Users\admin\AppData\Local\Temp\autF146.tmp | binary | |
MD5:0E65104906591BA1FAB714B173A460FB | SHA256:83B28E026DE4CE5588039491968A4E360C7334CEEAFC0E64A63BB19EFDE7F985 | |||
| 3784 | Azorult.exe | C:\Programdata\Microsoft\temp\H.bat | text | |
MD5:76303BB3BB0FAA707000DF998D8C9F3D | SHA256:A33AF2B70AD8FEA8900B6BD31AC7B0AAB8A2B8B79E3E27ADAFBD34BDFCB67549 | |||
| 2036 | wini.exe | C:\ProgramData\Windows\rutserv.exe | executable | |
MD5:37A8802017A212BB7F5255ABC7857969 | SHA256:1699B9B4FC1724F9B0918B57CA58C453829A3935EFD89BD4E9FA66B5E9F2B8A6 | |||
| 2036 | wini.exe | C:\ProgramData\Windows\install.bat | text | |
MD5:DB76C882184E8D2BAC56865C8E88F8FD | SHA256:E3DB831CDB021D6221BE26A36800844E9AF13811BAC9E4961AC21671DFF9207A | |||
| 2036 | wini.exe | C:\ProgramData\Windows\rfusclient.exe | executable | |
MD5:B8667A1E84567FCF7821BCEFB6A444AF | SHA256:DC9D875E659421A51ADDD8E8A362C926369E84320AB0C5D8BBB1E4D12D372FC9 | |||
| 2036 | wini.exe | C:\ProgramData\Windows\winit.exe | executable | |
MD5:03A781BB33A21A742BE31DEB053221F3 | SHA256:E95FC3E7ED9EC61BA7214CC3FE5D869E2EE22ABBEAC3052501813BB2B6DDE210 | |||
| 2036 | wini.exe | C:\ProgramData\Windows\vp8encoder.dll | executable | |
MD5:6298C0AF3D1D563834A218A9CC9F54BD | SHA256:81AF82019D9F45A697A8CA1788F2C5C0205AF9892EFD94879DEDF4BC06DB4172 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3784 | Azorult.exe | GET | 304 | 95.101.54.113:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?427c9e24a1504d9e | unknown | — | — | unknown |
2860 | winit.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | binary | 313 b | unknown |
1264 | RDPWInst.exe | GET | 304 | 95.101.54.113:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?06f9130f5a672118 | unknown | — | — | unknown |
3784 | Azorult.exe | GET | 200 | 95.101.54.113:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c560cb65c7ee1331 | unknown | compressed | 65.2 Kb | unknown |
3548 | taskhostw.exe | GET | 200 | 152.89.218.85:80 | http://taskhostw.com/randomx/STATUS.html | unknown | text | 6 b | unknown |
3548 | taskhostw.exe | GET | 404 | 152.89.218.85:80 | http://taskhostw.com/randomx/loaderTOP.html | unknown | html | 275 b | unknown |
3548 | taskhostw.exe | GET | 200 | 152.89.218.85:80 | http://taskhostw.com/randomx/Login.html | unknown | text | 4 b | unknown |
3784 | Azorult.exe | GET | 200 | 2.18.97.144:80 | http://x1.c.lencr.org/ | unknown | binary | 717 b | unknown |
3784 | Azorult.exe | GET | 200 | 69.192.161.44:80 | http://x2.c.lencr.org/ | unknown | binary | 299 b | unknown |
3548 | taskhostw.exe | GET | 200 | 152.89.218.85:80 | http://taskhostw.com/randomx/Password.html | unknown | text | 12 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1740 | rutserv.exe | 95.213.205.83:5655 | rms-server.tektonit.ru | OOO Network of data-centers Selectel | RU | unknown |
2860 | winit.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | unknown |
2860 | winit.exe | 194.0.200.251:465 | freemail.freehost.com.ua | PE Freehost | UA | unknown |
1264 | RDPWInst.exe | 185.199.110.133:443 | raw.githubusercontent.com | FASTLY | US | unknown |
1264 | RDPWInst.exe | 95.101.54.113:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
3784 | Azorult.exe | 104.21.4.208:443 | iplogger.org | CLOUDFLARENET | — | unknown |
3784 | Azorult.exe | 95.101.54.113:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
rms-server.tektonit.ru |
| malicious |
boglogov.site |
| unknown |
ip-api.com |
| shared |
freemail.freehost.com.ua |
| unknown |
raw.githubusercontent.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
iplogger.org |
| shared |
taskhostw.com |
| unknown |
x1.c.lencr.org |
| whitelisted |
x2.c.lencr.org |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2860 | winit.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
2860 | winit.exe | Potential Corporate Privacy Violation | AV POLICY Internal Host Retrieving External IP Address (ip-api. com) |
2860 | winit.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
1080 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY IP Check Domain (iplogger .org in DNS Lookup) |
3784 | Azorult.exe | Potential Corporate Privacy Violation | ET POLICY IP Check Domain (iplogger .org in TLS SNI) |
3548 | taskhostw.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
3548 | taskhostw.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
3548 | taskhostw.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
3548 | taskhostw.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
3548 | taskhostw.exe | Potential Corporate Privacy Violation | ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile |
Process | Message |
|---|---|
rutserv.exe | TMainService.Start |
rutserv.exe | GUID_MONITOR_POWER_ON |
rutserv.exe | 13-02-2024_02:34:25:580#T:Msg Size: 104 |
rutserv.exe | 13-02-2024_02:34:25:580#T:Msg code: 3 |
rutserv.exe | 13-02-2024_02:34:25:580#T:MSG_KEEP_ALIVE |
rutserv.exe | MSG_KEEP_ALIVE |
rutserv.exe | 13-02-2024_02:36:47:689#T:Msg Size: 104 |
rutserv.exe | 13-02-2024_02:36:47:689#T:Msg code: 3 |
rutserv.exe | 13-02-2024_02:36:47:689#T:MSG_KEEP_ALIVE |
rutserv.exe | MSG_KEEP_ALIVE |