Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 20:09

General

  • Target

    36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe

  • Size

    6.9MB

  • MD5

    36558a5968ee5e507796e0b6b2bf13c2

  • SHA1

    8dc1964e9e34ed52d783619929339759a728fdc0

  • SHA256

    24ab0e78ae8e2bd60d98a4e5e0af73a011ff3160151ae1e5510f49097cafaf21

  • SHA512

    47a238da02c82f78a38083b6cd3b7055607291933a7691db700d38b2d36f70226e69df4175603625dd33b46fb3f87b0af45c09842beca76cce67a3ebe5582de5

  • SSDEEP

    98304:iXR+907BLTQWQoB363zrCTN5FA1PubwpkPIUm1dvE9Sp4debNnPQI+DorDWqyncj:mRnN7qHCR5FCPubqkQh/EJLvnh

Malware Config

Extracted

Family

azorult

C2

http://51.15.126.138/8B4296D7-D3D3-4556-A73B-D4EA909600B7/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • NSIS installer 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 20 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 852
      2⤵
      • Program crash
      PID:2940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 828
      2⤵
      • Program crash
      PID:1948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 1004
      2⤵
      • Program crash
      PID:1440
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 1012
      2⤵
      • Program crash
      PID:2528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 828
      2⤵
      • Program crash
      PID:1700
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 1036
      2⤵
      • Program crash
      PID:3620
    • C:\Users\Admin\AppData\Local\Temp\AU3_EXE.exe
      "C:\Users\Admin\AppData\Local\Temp\AU3_EXE.exe"
      2⤵
      • Executes dropped EXE
      PID:5040
    • C:\Users\Admin\AppData\Local\Temp\convert-pdf-to-word-plus.exe
      "C:\Users\Admin\AppData\Local\Temp\convert-pdf-to-word-plus.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2108
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 1056
      2⤵
      • Program crash
      PID:4980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3952 -ip 3952
    1⤵
      PID:1236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3952 -ip 3952
      1⤵
        PID:3780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3952 -ip 3952
        1⤵
          PID:2312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3952 -ip 3952
          1⤵
            PID:2812
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3952 -ip 3952
            1⤵
              PID:1400
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3952 -ip 3952
              1⤵
                PID:2004
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3952 -ip 3952
                1⤵
                  PID:216

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\AU3_EXE.exe

                  Filesize

                  112KB

                  MD5

                  95a4430eea1fae9a0fb59a5b25e3ebd9

                  SHA1

                  21acabef808e4554aa1fe41db03b8bbd1fa5183a

                  SHA256

                  f71f02bd8aa0723c8cb913bad1af212637f7689c8baaf4f99ff4445e3654b9c5

                  SHA512

                  0ee9963d8a639316b261fd021e8e5ccfb37b6417dfe775fa20f727e6e7df4084cb3d5da09ce46185c1569ae5425d85fa966c31e4aa2f19f3ca1f7c2082747794

                • C:\Users\Admin\AppData\Local\Temp\convert-pdf-to-word-plus.exe

                  Filesize

                  5.1MB

                  MD5

                  4c4f9c3f0dd763aae2de77d5354ee97d

                  SHA1

                  239398a5266c0a032eebb95c97542e29c0de00f8

                  SHA256

                  4415cc989396ae301d103d11dd3aa7c90cbf9fb3a7aa49113a410efab8edebe3

                  SHA512

                  a8c3133cb7e7e16e3348bb0193a1233ec93547fec340666068eb381e987964f018d8a3cadc8eb620f5ef614187995b80010e644a75ccb92c19faf43b70d3cd8a

                • C:\Users\Admin\AppData\Local\Temp\nsa619A.tmp\InstallOptions.dll

                  Filesize

                  14KB

                  MD5

                  325b008aec81e5aaa57096f05d4212b5

                  SHA1

                  27a2d89747a20305b6518438eff5b9f57f7df5c3

                  SHA256

                  c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

                  SHA512

                  18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

                • C:\Users\Admin\AppData\Local\Temp\nsa619A.tmp\ioSpecial.ini

                  Filesize

                  763B

                  MD5

                  2153091036c395d796024e233f29dd7b

                  SHA1

                  6e55bda4ea68022c7e99e462fa917273a2be326b

                  SHA256

                  214f94e623f25614bd0c7e873e4ad1606504c6d49d85be387b0c86aca445c8dd

                  SHA512

                  27b9f73f0225a59d8541a36695e12e57fd859c90959a129c5fe84921df8346847c0d77ae91b63af27ee352a66fabd7d627025ba0c11fd461c9760b626ebc8ffd

                • memory/3952-0-0x0000000000400000-0x0000000000AE2000-memory.dmp

                  Filesize

                  6.9MB

                • memory/3952-2-0x0000000002DC0000-0x0000000003475000-memory.dmp

                  Filesize

                  6.7MB

                • memory/3952-4-0x0000000000400000-0x000000000093D000-memory.dmp

                  Filesize

                  5.2MB

                • memory/3952-96-0x0000000000400000-0x0000000000AE2000-memory.dmp

                  Filesize

                  6.9MB

                • memory/3952-97-0x0000000000400000-0x000000000093D000-memory.dmp

                  Filesize

                  5.2MB

                • memory/5040-98-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/5040-100-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/5040-102-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB