Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 00:04

General

  • Target

    31b9bfaea5d5497f00a7c0ab00d0e47f_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    31b9bfaea5d5497f00a7c0ab00d0e47f

  • SHA1

    e1862fc7f0643badedc40332254325fdb4f6f78e

  • SHA256

    91f4ead9870c82ed4bb9b4759ec52c0a083c149ca027337de8680cb0a3363a05

  • SHA512

    166bf4cd09e846b59db7c27a79cc9c7e202cb9ed65788c02cd024072218bb9d7e8775dbdc03b424b2abe8f5776eca980c2e629192dd06992969c17a37fa3e339

  • SSDEEP

    49152:lpVtsGrf3UcISmuAM5MnM5WaibBrRqxhgqGJ+w8+Tn+rYTgF:lJRJ5XRibsy+wPnGn

Malware Config

Extracted

Family

azorult

C2

http://b-cointrade.com/sti/gate.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31b9bfaea5d5497f00a7c0ab00d0e47f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\31b9bfaea5d5497f00a7c0ab00d0e47f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\31b9bfaea5d5497f00a7c0ab00d0e47f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\31b9bfaea5d5497f00a7c0ab00d0e47f_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\lsssa.exe
        "C:\Users\Admin\AppData\Local\Temp\lsssa.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Users\Admin\AppData\Local\Temp\lsssa.exe
          "C:\Users\Admin\AppData\Local\Temp\lsssa.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Maps connected drives based on registry
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k
            5⤵
            • Maps connected drives based on registry
            PID:2700
      • C:\Users\Admin\AppData\Local\Temp\winIogon.exe
        "C:\Users\Admin\AppData\Local\Temp\winIogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\System32\svchost.exe"
          4⤵
            PID:2628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\lsssa.exe

      Filesize

      836KB

      MD5

      9b7565d601e2ab2c07ee754b642d39e8

      SHA1

      d4ffb12906f5e1d52c0e94586d57615c70d83c90

      SHA256

      d1f31cf808b1a1cd201672413b646c2a8c6a0ca9066011afcc2f145404ad0b90

      SHA512

      816b268be5733a88b36a5f9c72b5ef9a8c5d4e25ea2d08b08c519276b13c74a399addcbb2cd76fe7fc12fe882a046c2ab16a16aba8ea033f5429512e2991fd04

    • \Users\Admin\AppData\Local\Temp\winIogon.exe

      Filesize

      781KB

      MD5

      d9355e3d79797a292e2d14aed3867711

      SHA1

      f16607467f566b8bb3f3747e5d3a96925d2d1f86

      SHA256

      6776a1076067899c3646967e037309108d3f93e24c777f0a46caa1f7910eb72e

      SHA512

      ec30f650151370e0f0bab93c2edda0e8867e41bec2d132607fa164d88977a31cfbec4dc1e0d070ed6d46840d411316427dcdc18d3b0989a98dc8224294062c94

    • memory/2260-5-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2260-22-0x0000000074640000-0x0000000074BEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2260-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2260-7-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2260-10-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2260-3-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2260-44-0x0000000074640000-0x0000000074BEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2260-13-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2260-23-0x0000000074640000-0x0000000074BEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2260-18-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2260-20-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2420-21-0x0000000074640000-0x0000000074BEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2420-2-0x0000000074640000-0x0000000074BEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2420-1-0x0000000074640000-0x0000000074BEB000-memory.dmp

      Filesize

      5.7MB

    • memory/2420-0-0x0000000074641000-0x0000000074642000-memory.dmp

      Filesize

      4KB

    • memory/2544-50-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2544-46-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-53-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-59-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-67-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-66-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-92-0x0000000010000000-0x0000000010089000-memory.dmp

      Filesize

      548KB

    • memory/2544-91-0x0000000003090000-0x00000000031CC000-memory.dmp

      Filesize

      1.2MB

    • memory/2544-56-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-62-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2544-48-0x0000000000400000-0x0000000000474000-memory.dmp

      Filesize

      464KB

    • memory/2628-79-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2628-75-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2628-72-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2628-70-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2628-82-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2628-85-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2628-88-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB

    • memory/2628-86-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2628-68-0x0000000000400000-0x0000000000483000-memory.dmp

      Filesize

      524KB