Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe
-
Size
595KB
-
MD5
321c6230b9d1a1082461464b9faf1570
-
SHA1
c302f07f6c01ab0c6b831865d092afb902ee1e83
-
SHA256
4d17534f1f36caa88187ffb6d18fada59e60130a03106630c1cf51fd3c302148
-
SHA512
90897955fc124b9d725b56780ed14d20233283a75ad190558fde41f8c8d7388a7b62ffa24d0018b372ecbf0956df235006d07af9bf83dbb2c8e4e91162485986
-
SSDEEP
12288:YW9xNbjckK1U5K62bjgJJZ+at9upCAt7VoiRw:tbjrKef2/g4aD87yii
Malware Config
Extracted
azorult
http://doueven.click/gate.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 5040 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 436 wrote to memory of 4332 436 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe 83 PID 436 wrote to memory of 4332 436 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe 83 PID 436 wrote to memory of 4332 436 321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe 83 PID 4332 wrote to memory of 5040 4332 cmd.exe 85 PID 4332 wrote to memory of 5040 4332 cmd.exe 85 PID 4332 wrote to memory of 5040 4332 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 1 & del "C:\Users\Admin\AppData\Local\Temp\321c6230b9d1a1082461464b9faf1570_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5040
-
-