Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
394e34fda29c278b412e10ba43c120fb
-
SHA1
2f8870e215efd1b623568d21a96bef488945b438
-
SHA256
56dd2710c7ec6a6a947409876cf8d1d5415c4e927d99ef4681246c5592a36ca0
-
SHA512
ddc1b8baec96a7fc211c7f6f203681d53b59211a3c8b1402fc46ed57508694f40309d19a25280b7ba641a62148a3bfc746c893c185af2e64b2f3e4c48143fc2b
-
SSDEEP
24576:Tu6J33O0c+JY5UZ+XC0kGso6FasuxZHhuKHkOfqtWrSheMNWY:9u0c++OCvkGs9FasA4Of2WrSYY
Malware Config
Extracted
azorult
http://cn14297.tmweb.ru/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 228 set thread context of 216 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1268 216 WerFault.exe 85 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2968 PING.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 228 wrote to memory of 216 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 85 PID 228 wrote to memory of 216 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 85 PID 228 wrote to memory of 216 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 85 PID 228 wrote to memory of 216 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 85 PID 228 wrote to memory of 216 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 85 PID 228 wrote to memory of 3220 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 86 PID 228 wrote to memory of 3220 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 86 PID 228 wrote to memory of 3220 228 394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe 86 PID 3220 wrote to memory of 2968 3220 cmd.exe 88 PID 3220 wrote to memory of 2968 3220 cmd.exe 88 PID 3220 wrote to memory of 2968 3220 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe"2⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 14483⤵
- Program crash
PID:1268
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /k ping 127.0.0.1 -t 0 & del C:\Users\Admin\AppData\Local\Temp\394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -t 03⤵
- Runs ping.exe
PID:2968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 216 -ip 2161⤵PID:1188