Malware Analysis Report

2024-08-06 13:50

Sample ID 240512-m4v53aca7z
Target 39c368074a4380b85e3291d787f7562f_JaffaCakes118
SHA256 c4d194e400f2ea4c7df3b8d392c8b4fcb2868e1bddf2445e83c6baa2fe6524c6
Tags
azorult discovery infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c4d194e400f2ea4c7df3b8d392c8b4fcb2868e1bddf2445e83c6baa2fe6524c6

Threat Level: Known bad

The file 39c368074a4380b85e3291d787f7562f_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

azorult discovery infostealer trojan

Azorult

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Checks installed software on the system

Drops file in Program Files directory

Unsigned PE

Program crash

Enumerates physical storage devices

Checks processor information in registry

Enumerates system info in registry

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-12 11:01

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-12 11:01

Reported

2024-05-12 11:04

Platform

win7-20240215-en

Max time kernel

118s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Checks installed software on the system

discovery

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2896 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2896 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2896 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2896 wrote to memory of 2476 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2896 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2896 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2896 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2896 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2596 wrote to memory of 2752 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2596 wrote to memory of 2752 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2596 wrote to memory of 2752 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2596 wrote to memory of 2752 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 1184

Network

Country Destination Domain Proto
RU 92.63.192.72:80 92.63.192.72 tcp
US 8.8.8.8:53 istats.club udp

Files

\Program Files (x86)\LetsSee!\busshost.exe

MD5 ff562e999268780e4e2127df81b5d59f
SHA1 508d5281c4086da69edb1cac1abc74fd628e7527
SHA256 226b143545f3c952d99a200c18cd06f90eb98e64b477f9ab2aa5838cd0e72cd0
SHA512 d35d23a04a4f420ea8b2aae4f42979c3b9e2bc43ff1bfa240946789149996dd6880601ef9b02393be3201eaba9be7bd7198b14cd954bdba48e6a0ae29c4f7a01

\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 c53d2de8becdaf58caba89a297455c65
SHA1 c60da079393025e63475683375e0a045cefa3473
SHA256 7d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512 a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878

memory/2896-33-0x0000000000400000-0x0000000000435000-memory.dmp

memory/2596-35-0x00000000009B0000-0x0000000000CB8000-memory.dmp

memory/2596-36-0x0000000000810000-0x000000000081A000-memory.dmp

memory/2596-37-0x0000000005060000-0x00000000054BA000-memory.dmp

memory/2596-38-0x0000000000930000-0x0000000000940000-memory.dmp

memory/2596-40-0x0000000000950000-0x000000000095A000-memory.dmp

memory/2596-39-0x0000000000940000-0x000000000094A000-memory.dmp

memory/2596-41-0x0000000000980000-0x000000000098A000-memory.dmp

memory/2596-43-0x00000000009A0000-0x00000000009AE000-memory.dmp

memory/2596-42-0x0000000000990000-0x0000000000998000-memory.dmp

memory/2596-44-0x0000000002100000-0x0000000002108000-memory.dmp

memory/2596-45-0x0000000002110000-0x0000000002118000-memory.dmp

memory/2596-46-0x0000000002120000-0x0000000002128000-memory.dmp

memory/2596-47-0x0000000002130000-0x0000000002138000-memory.dmp

memory/2596-48-0x0000000002190000-0x0000000002198000-memory.dmp

memory/2596-49-0x0000000002250000-0x0000000002258000-memory.dmp

memory/2476-51-0x0000000000400000-0x00000000052B9000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-12 11:01

Reported

2024-05-12 11:04

Platform

win10v2004-20240508-en

Max time kernel

92s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Checks installed software on the system

discovery

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\39c368074a4380b85e3291d787f7562f_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3060 -ip 3060

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 1612

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3456 -ip 3456

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 1004

Network

Country Destination Domain Proto
US 8.8.8.8:53 istats.club udp
RU 92.63.192.72:80 92.63.192.72 tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 72.192.63.92.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
NL 23.62.61.192:443 www.bing.com tcp
US 8.8.8.8:53 192.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 31.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp

Files

C:\Program Files (x86)\LetsSee!\busshost.exe

MD5 ff562e999268780e4e2127df81b5d59f
SHA1 508d5281c4086da69edb1cac1abc74fd628e7527
SHA256 226b143545f3c952d99a200c18cd06f90eb98e64b477f9ab2aa5838cd0e72cd0
SHA512 d35d23a04a4f420ea8b2aae4f42979c3b9e2bc43ff1bfa240946789149996dd6880601ef9b02393be3201eaba9be7bd7198b14cd954bdba48e6a0ae29c4f7a01

C:\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 c53d2de8becdaf58caba89a297455c65
SHA1 c60da079393025e63475683375e0a045cefa3473
SHA256 7d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512 a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878

memory/4532-36-0x0000000000400000-0x0000000000435000-memory.dmp

memory/3060-38-0x0000000000BE0000-0x0000000000EE8000-memory.dmp

memory/3060-39-0x0000000003290000-0x000000000329A000-memory.dmp

memory/3060-40-0x0000000005AD0000-0x0000000005F2A000-memory.dmp

memory/3060-41-0x0000000005900000-0x0000000005910000-memory.dmp

memory/3060-47-0x0000000005A90000-0x0000000005A98000-memory.dmp

memory/3060-49-0x0000000005AB0000-0x0000000005AB8000-memory.dmp

memory/3060-50-0x00000000061D0000-0x00000000061D8000-memory.dmp

memory/3060-52-0x00000000061F0000-0x00000000061F8000-memory.dmp

memory/3060-51-0x00000000061E0000-0x00000000061E8000-memory.dmp

memory/3060-48-0x0000000005AA0000-0x0000000005AA8000-memory.dmp

memory/3060-46-0x0000000005A50000-0x0000000005A5E000-memory.dmp

memory/3060-45-0x0000000005A70000-0x0000000005A78000-memory.dmp

memory/3060-44-0x0000000005A60000-0x0000000005A6A000-memory.dmp

memory/3060-43-0x0000000005A30000-0x0000000005A3A000-memory.dmp

memory/3060-42-0x0000000005910000-0x000000000591A000-memory.dmp

memory/3456-54-0x0000000000400000-0x00000000052B9000-memory.dmp