Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12-05-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
39c368074a4380b85e3291d787f7562f
-
SHA1
82c8e32c6f3e8ab032d28c893495254562a7c8fd
-
SHA256
c4d194e400f2ea4c7df3b8d392c8b4fcb2868e1bddf2445e83c6baa2fe6524c6
-
SHA512
9ac0fa86cffec8afaa93ba65c467cb32043a75a2a8c36fc6a24f28a5db000caa143efd418924ffa6670ed16533b5fd9766002f765dd485b8d85050088f6256f5
-
SSDEEP
98304:1AI+RTAf+MzQSioq96WMb3O6pLve2WX69t6S9I+H:mtbMZq9666pLvejX06SOM
Malware Config
Extracted
azorult
http://92.63.192.72/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 2 IoCs
Processes:
busshost.exeYTLoader.exepid process 2476 busshost.exe 2596 YTLoader.exe -
Loads dropped DLL 8 IoCs
Processes:
39c368074a4380b85e3291d787f7562f_JaffaCakes118.exeWerFault.exepid process 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
Processes:
39c368074a4380b85e3291d787f7562f_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe File created C:\Program Files (x86)\LetsSee!\Uninstall.ini 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2752 2596 WerFault.exe YTLoader.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
YTLoader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 YTLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString YTLoader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
YTLoader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS YTLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer YTLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName YTLoader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
YTLoader.exedescription pid process Token: SeDebugPrivilege 2596 YTLoader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
39c368074a4380b85e3291d787f7562f_JaffaCakes118.exeYTLoader.exedescription pid process target process PID 2896 wrote to memory of 2476 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe busshost.exe PID 2896 wrote to memory of 2476 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe busshost.exe PID 2896 wrote to memory of 2476 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe busshost.exe PID 2896 wrote to memory of 2476 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe busshost.exe PID 2896 wrote to memory of 2596 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe YTLoader.exe PID 2896 wrote to memory of 2596 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe YTLoader.exe PID 2896 wrote to memory of 2596 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe YTLoader.exe PID 2896 wrote to memory of 2596 2896 39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe YTLoader.exe PID 2596 wrote to memory of 2752 2596 YTLoader.exe WerFault.exe PID 2596 wrote to memory of 2752 2596 YTLoader.exe WerFault.exe PID 2596 wrote to memory of 2752 2596 YTLoader.exe WerFault.exe PID 2596 wrote to memory of 2752 2596 YTLoader.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\LetsSee!\busshost.exe"C:\Program Files (x86)\LetsSee!\busshost.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\LetsSee!\YTLoader.exe"C:\Program Files (x86)\LetsSee!\YTLoader.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 11843⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Program Files (x86)\LetsSee!\YTLoader.exeFilesize
3.0MB
MD5c53d2de8becdaf58caba89a297455c65
SHA1c60da079393025e63475683375e0a045cefa3473
SHA2567d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878
-
\Program Files (x86)\LetsSee!\busshost.exeFilesize
318KB
MD5ff562e999268780e4e2127df81b5d59f
SHA1508d5281c4086da69edb1cac1abc74fd628e7527
SHA256226b143545f3c952d99a200c18cd06f90eb98e64b477f9ab2aa5838cd0e72cd0
SHA512d35d23a04a4f420ea8b2aae4f42979c3b9e2bc43ff1bfa240946789149996dd6880601ef9b02393be3201eaba9be7bd7198b14cd954bdba48e6a0ae29c4f7a01
-
memory/2476-51-0x0000000000400000-0x00000000052B9000-memory.dmpFilesize
78.7MB
-
memory/2596-39-0x0000000000940000-0x000000000094A000-memory.dmpFilesize
40KB
-
memory/2596-43-0x00000000009A0000-0x00000000009AE000-memory.dmpFilesize
56KB
-
memory/2596-37-0x0000000005060000-0x00000000054BA000-memory.dmpFilesize
4.4MB
-
memory/2596-38-0x0000000000930000-0x0000000000940000-memory.dmpFilesize
64KB
-
memory/2596-40-0x0000000000950000-0x000000000095A000-memory.dmpFilesize
40KB
-
memory/2596-35-0x00000000009B0000-0x0000000000CB8000-memory.dmpFilesize
3.0MB
-
memory/2596-41-0x0000000000980000-0x000000000098A000-memory.dmpFilesize
40KB
-
memory/2596-36-0x0000000000810000-0x000000000081A000-memory.dmpFilesize
40KB
-
memory/2596-42-0x0000000000990000-0x0000000000998000-memory.dmpFilesize
32KB
-
memory/2596-44-0x0000000002100000-0x0000000002108000-memory.dmpFilesize
32KB
-
memory/2596-45-0x0000000002110000-0x0000000002118000-memory.dmpFilesize
32KB
-
memory/2596-46-0x0000000002120000-0x0000000002128000-memory.dmpFilesize
32KB
-
memory/2596-47-0x0000000002130000-0x0000000002138000-memory.dmpFilesize
32KB
-
memory/2596-48-0x0000000002190000-0x0000000002198000-memory.dmpFilesize
32KB
-
memory/2596-49-0x0000000002250000-0x0000000002258000-memory.dmpFilesize
32KB
-
memory/2896-33-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB