Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
c62b0f6c44abf03c26dab89826464f74_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c62b0f6c44abf03c26dab89826464f74_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/lyinn.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/lyinn.dll
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/lyinn.dll
-
Size
26KB
-
MD5
b7f9a167c3af210c5a0be8393b9f04e2
-
SHA1
8e540308abf226139bf08c61fa21598c0eb055da
-
SHA256
fd6451ef4e817f604a14be5ab85b5e9890a276ba877d38a9b9544c41ed4718a7
-
SHA512
75a44e8939f23fa143b67fbd664b81758c0718343e7cb3836b5651bd87e0533d03973b34cbb7b03b50a1fb3828fb0ddf93b205f42e0c8198bfb575088dc9b128
-
SSDEEP
384:CWt7vqwJ2B3uyRZ3rcg3b8WWA5oYjH8T9jwiXaqQUfkysX:1sBBH3I6WS78T5FX5fkv
Malware Config
Extracted
azorult
http://21slg.xyz/PL341/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2356 944 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1692 2848 rundll32.exe 28 PID 2848 wrote to memory of 1692 2848 rundll32.exe 28 PID 2848 wrote to memory of 1692 2848 rundll32.exe 28 PID 2848 wrote to memory of 1692 2848 rundll32.exe 28 PID 2848 wrote to memory of 1692 2848 rundll32.exe 28 PID 2848 wrote to memory of 1692 2848 rundll32.exe 28 PID 2848 wrote to memory of 1692 2848 rundll32.exe 28 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 1692 wrote to memory of 944 1692 rundll32.exe 29 PID 944 wrote to memory of 2356 944 rundll32.exe 30 PID 944 wrote to memory of 2356 944 rundll32.exe 30 PID 944 wrote to memory of 2356 944 rundll32.exe 30 PID 944 wrote to memory of 2356 944 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lyinn.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lyinn.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\lyinn.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 1964⤵
- Program crash
PID:2356
-
-
-