Malware Analysis Report

2024-08-06 13:48

Sample ID 240516-vv5bdafd87
Target 4c328d4cebe407bca126c177dc18bc34_JaffaCakes118
SHA256 31de3bb41297569433434ed6cb90a133e22655f30322caf78948310b713f1be7
Tags
azorult discovery infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

31de3bb41297569433434ed6cb90a133e22655f30322caf78948310b713f1be7

Threat Level: Known bad

The file 4c328d4cebe407bca126c177dc18bc34_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

azorult discovery infostealer trojan

Azorult

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Checks installed software on the system

Drops file in Program Files directory

Unsigned PE

Program crash

Enumerates physical storage devices

Checks processor information in registry

Enumerates system info in registry

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-16 17:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 17:19

Reported

2024-05-16 17:22

Platform

win7-20240220-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Checks installed software on the system

discovery

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2292 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2292 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2292 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2292 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\busshost.exe
PID 2292 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2292 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2292 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2292 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe C:\Program Files (x86)\LetsSee!\YTLoader.exe
PID 2664 wrote to memory of 2068 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2664 wrote to memory of 2068 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2664 wrote to memory of 2068 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe
PID 2664 wrote to memory of 2068 N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 1180

Network

Country Destination Domain Proto
RU 92.63.192.72:80 92.63.192.72 tcp
US 8.8.8.8:53 istats.club udp

Files

C:\Program Files (x86)\LetsSee!\busshost.exe

MD5 691d9e865f881ca425bfbed85f70200e
SHA1 16bcbb6921d1ca48c24ac35a855fb3978abc46da
SHA256 f23ac15bc83c47dd99753ee0e0c7815b3bb015edc02de45ea94931bf5be7d37a
SHA512 f5c4dea60ad1a3cda6f7fe282f0b759e5fd0e71d346a3de6c136401d9f417019b293664ece797dc1355ff7ba200890dee824173a98c861bbeff9b5c61c1ba9aa

\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 c53d2de8becdaf58caba89a297455c65
SHA1 c60da079393025e63475683375e0a045cefa3473
SHA256 7d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512 a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878

memory/2292-34-0x0000000000400000-0x0000000000435000-memory.dmp

memory/2664-35-0x0000000073B8E000-0x0000000073B8F000-memory.dmp

memory/2664-36-0x0000000000250000-0x0000000000558000-memory.dmp

memory/2664-38-0x0000000000720000-0x000000000072A000-memory.dmp

memory/2664-37-0x0000000073B80000-0x000000007426E000-memory.dmp

memory/2664-39-0x0000000004F70000-0x00000000053CA000-memory.dmp

memory/2664-40-0x00000000007F0000-0x0000000000800000-memory.dmp

memory/2664-42-0x0000000000980000-0x000000000098A000-memory.dmp

memory/2664-41-0x0000000000800000-0x000000000080A000-memory.dmp

memory/2664-43-0x0000000002140000-0x000000000214A000-memory.dmp

memory/2664-45-0x0000000002160000-0x000000000216E000-memory.dmp

memory/2664-44-0x0000000002150000-0x0000000002158000-memory.dmp

memory/2664-46-0x00000000021B0000-0x00000000021B8000-memory.dmp

memory/2664-47-0x0000000002200000-0x0000000002208000-memory.dmp

memory/2664-48-0x0000000002210000-0x0000000002218000-memory.dmp

memory/2664-49-0x0000000002220000-0x0000000002228000-memory.dmp

memory/2664-50-0x0000000002240000-0x0000000002248000-memory.dmp

memory/2664-51-0x0000000002250000-0x0000000002258000-memory.dmp

memory/2164-53-0x00000000008E0000-0x00000000009E0000-memory.dmp

memory/2164-54-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2164-56-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2164-55-0x0000000000400000-0x0000000000475000-memory.dmp

memory/2664-62-0x0000000073B8E000-0x0000000073B8F000-memory.dmp

memory/2664-63-0x0000000073B80000-0x000000007426E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 17:19

Reported

2024-05-16 17:22

Platform

win10v2004-20240426-en

Max time kernel

135s

Max time network

105s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\LetsSee!\busshost.exe N/A
N/A N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Checks installed software on the system

discovery

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\LetsSee!\Uninstall.ini C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\YTLoader.exe C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\busshost.exe C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LetsSee!\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files (x86)\LetsSee!\YTLoader.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\4c328d4cebe407bca126c177dc18bc34_JaffaCakes118.exe"

C:\Program Files (x86)\LetsSee!\busshost.exe

"C:\Program Files (x86)\LetsSee!\busshost.exe"

C:\Program Files (x86)\LetsSee!\YTLoader.exe

"C:\Program Files (x86)\LetsSee!\YTLoader.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4748 -ip 4748

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 1612

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4144 -ip 4144

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 1232

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 istats.club udp
US 8.8.8.8:53 80.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.170:443 www.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 170.61.62.23.in-addr.arpa udp
NL 23.62.61.170:443 www.bing.com tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
RU 92.63.192.72:80 92.63.192.72 tcp
US 8.8.8.8:53 72.192.63.92.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 52.111.227.11:443 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

C:\Program Files (x86)\LetsSee!\busshost.exe

MD5 691d9e865f881ca425bfbed85f70200e
SHA1 16bcbb6921d1ca48c24ac35a855fb3978abc46da
SHA256 f23ac15bc83c47dd99753ee0e0c7815b3bb015edc02de45ea94931bf5be7d37a
SHA512 f5c4dea60ad1a3cda6f7fe282f0b759e5fd0e71d346a3de6c136401d9f417019b293664ece797dc1355ff7ba200890dee824173a98c861bbeff9b5c61c1ba9aa

C:\Program Files (x86)\LetsSee!\YTLoader.exe

MD5 c53d2de8becdaf58caba89a297455c65
SHA1 c60da079393025e63475683375e0a045cefa3473
SHA256 7d6eb1a70a0fc72adbcf03c05283b40e1ff656d655dbacf4e20fd6d635d46272
SHA512 a189cba278167f104ae0b27432b5c9a6153b2d8c3d0b6db82d5b71db7d23b9f0226519cc816ba0f5c360f9b029b0bef1636ab41f4ad742808824334e30f65878

memory/3088-36-0x0000000000400000-0x0000000000435000-memory.dmp

memory/4748-38-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

memory/4748-39-0x0000000000D00000-0x0000000001008000-memory.dmp

memory/4748-40-0x0000000003250000-0x000000000325A000-memory.dmp

memory/4748-41-0x0000000074E30000-0x00000000755E0000-memory.dmp

memory/4748-42-0x0000000005AA0000-0x0000000005EFA000-memory.dmp

memory/4748-43-0x00000000058E0000-0x00000000058F0000-memory.dmp

memory/4748-44-0x00000000058F0000-0x00000000058FA000-memory.dmp

memory/4748-46-0x0000000005930000-0x000000000593A000-memory.dmp

memory/4748-49-0x0000000005960000-0x0000000005968000-memory.dmp

memory/4748-51-0x0000000005980000-0x0000000005988000-memory.dmp

memory/4748-52-0x00000000061B0000-0x00000000061B8000-memory.dmp

memory/4748-53-0x00000000061C0000-0x00000000061C8000-memory.dmp

memory/4748-50-0x0000000005970000-0x0000000005978000-memory.dmp

memory/4748-54-0x00000000061D0000-0x00000000061D8000-memory.dmp

memory/4748-45-0x0000000005900000-0x000000000590A000-memory.dmp

memory/4748-47-0x0000000005940000-0x0000000005948000-memory.dmp

memory/4748-48-0x0000000005920000-0x000000000592E000-memory.dmp

memory/4748-55-0x0000000074E30000-0x00000000755E0000-memory.dmp

memory/4144-57-0x0000000000530000-0x0000000000630000-memory.dmp

memory/4144-58-0x0000000000400000-0x0000000000420000-memory.dmp

memory/4144-59-0x0000000000400000-0x0000000000475000-memory.dmp

memory/4144-60-0x0000000000400000-0x0000000000420000-memory.dmp