Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe
-
Size
6.9MB
-
MD5
36558a5968ee5e507796e0b6b2bf13c2
-
SHA1
8dc1964e9e34ed52d783619929339759a728fdc0
-
SHA256
24ab0e78ae8e2bd60d98a4e5e0af73a011ff3160151ae1e5510f49097cafaf21
-
SHA512
47a238da02c82f78a38083b6cd3b7055607291933a7691db700d38b2d36f70226e69df4175603625dd33b46fb3f87b0af45c09842beca76cce67a3ebe5582de5
-
SSDEEP
98304:iXR+907BLTQWQoB363zrCTN5FA1PubwpkPIUm1dvE9Sp4debNnPQI+DorDWqyncj:mRnN7qHCR5FCPubqkQh/EJLvnh
Malware Config
Extracted
azorult
http://51.15.126.138/8B4296D7-D3D3-4556-A73B-D4EA909600B7/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
pid Process 2136 AU3_EXE.exe 2996 convert-pdf-to-word-plus.exe -
Loads dropped DLL 7 IoCs
pid Process 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 2996 convert-pdf-to-word-plus.exe 2996 convert-pdf-to-word-plus.exe 2996 convert-pdf-to-word-plus.exe 2996 convert-pdf-to-word-plus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00230000000122f8-15.dat nsis_installer_1 behavioral1/files/0x00230000000122f8-15.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 convert-pdf-to-word-plus.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2136 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2136 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2136 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2136 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2996 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2996 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2996 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2996 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2996 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2996 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 29 PID 2292 wrote to memory of 2996 2292 36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\AU3_EXE.exe"C:\Users\Admin\AppData\Local\Temp\AU3_EXE.exe"2⤵
- Executes dropped EXE
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\convert-pdf-to-word-plus.exe"C:\Users\Admin\AppData\Local\Temp\convert-pdf-to-word-plus.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724B
MD51b319c1bd6f828fd468ca6a50d7025bd
SHA17eae0e9ab3ea42ebab742466e350b4857d597607
SHA2564e3aac5e1a774dd9b512119ab24de2892ce0f24a42fc67cd8a46978ac95a0071
SHA512155b0c9f7c69a988d3a7620a27582dca8b3d8de100a857455fb66601d069cbc1de6ddfb6805f9e58da5d7828645daa393c26135041bef02494eab49efc0ee2ae
-
Filesize
763B
MD5aeca22ad2a4bf84578777c0b3c3b0fdf
SHA173f2e0705083feeca141575e1004fa35a9961c7c
SHA25681f327a0f59aa563ed27f6aacfe9b73067f2275f43439821d5ab5f5cab88c01d
SHA51281a14731d65490ef745292e8dc9ee670c29286274bccb24d8d8756da0948caa37c316412c781e502ad64e96dcc9e6399063b3583ffceeaee23e4da73a2601016
-
Filesize
112KB
MD595a4430eea1fae9a0fb59a5b25e3ebd9
SHA121acabef808e4554aa1fe41db03b8bbd1fa5183a
SHA256f71f02bd8aa0723c8cb913bad1af212637f7689c8baaf4f99ff4445e3654b9c5
SHA5120ee9963d8a639316b261fd021e8e5ccfb37b6417dfe775fa20f727e6e7df4084cb3d5da09ce46185c1569ae5425d85fa966c31e4aa2f19f3ca1f7c2082747794
-
Filesize
5.1MB
MD54c4f9c3f0dd763aae2de77d5354ee97d
SHA1239398a5266c0a032eebb95c97542e29c0de00f8
SHA2564415cc989396ae301d103d11dd3aa7c90cbf9fb3a7aa49113a410efab8edebe3
SHA512a8c3133cb7e7e16e3348bb0193a1233ec93547fec340666068eb381e987964f018d8a3cadc8eb620f5ef614187995b80010e644a75ccb92c19faf43b70d3cd8a
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf