Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe
-
Size
845KB
-
MD5
2ba5aff736713acd479ee6a7706f34e5
-
SHA1
358b88308db6f71961faea61c9b3c995897ca839
-
SHA256
90959ae72468c4b656f4cac46202eb6629c4288e438f6c0733afa9bead4639ed
-
SHA512
165966d49c3c67aa4b4ae83d079c324ba6225f880a2de4905dfbe886df134590b7ad089a540b9a0ea68db3343e04de0b7b8c528cbb074ebf44c977f49aa160d4
-
SSDEEP
12288:hi543scZgAJP7g5goVhMl0ndjPVCF1e19EUsiOwvH+aoC+/Donj29dnLVPp:hi5hy7gioVbjYHK6Jxao5oCLn
Malware Config
Extracted
azorult
http://104.233.105.159/0/aa-00/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exedescription pid process target process PID 3016 set thread context of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exedescription pid process target process PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe PID 3016 wrote to memory of 2744 3016 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe 2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ba5aff736713acd479ee6a7706f34e5_JaffaCakes118.exe"2⤵PID:2744