Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe
-
Size
965KB
-
MD5
4c6d077efc220f1f2b940a55c22055d3
-
SHA1
e37cfad0a8e328d2d60b2fbaf19db91a73966849
-
SHA256
bda2ca03c7cc1a1176e210747275d8f05cf1ad5eadb608859ff90db1a591071e
-
SHA512
1054748a878896eb330545b1eaf80ab016091d77ed0a37e6aea8046985858199a97a41d983bb251d3d518d0394c321182b7c2d5e805c305a3e87a23ea6d20429
-
SSDEEP
12288:qh995HQnOWZ9r2VMrmgOkCiXn9fsKMt54P9YE4BDIfrpnzTvoX5u2xOcF1QTn0wI:qhHMDfrOgWq9UznzDIfNzTaPfu7w5XN
Malware Config
Extracted
azorult
http://fxcoin.in/fxcoin/4/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 3 IoCs
pid Process 1592 StikyNot.exe 1808 StikyNot.exe 1000 StikyNot.exe -
Loads dropped DLL 3 IoCs
pid Process 2512 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" StikyNot.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1240 set thread context of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 set thread context of 2512 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 31 PID 1592 set thread context of 1808 1592 StikyNot.exe 35 PID 1592 set thread context of 2272 1592 StikyNot.exe 36 -
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe diskperf.exe File created C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe diskperf.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe 2272 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe 2512 diskperf.exe 2272 diskperf.exe 2512 diskperf.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2480 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 30 PID 1240 wrote to memory of 2512 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 31 PID 1240 wrote to memory of 2512 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 31 PID 1240 wrote to memory of 2512 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 31 PID 1240 wrote to memory of 2512 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 31 PID 1240 wrote to memory of 2512 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 31 PID 1240 wrote to memory of 2512 1240 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe 31 PID 2512 wrote to memory of 1592 2512 diskperf.exe 34 PID 2512 wrote to memory of 1592 2512 diskperf.exe 34 PID 2512 wrote to memory of 1592 2512 diskperf.exe 34 PID 2512 wrote to memory of 1592 2512 diskperf.exe 34 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 1808 1592 StikyNot.exe 35 PID 1592 wrote to memory of 2272 1592 StikyNot.exe 36 PID 1592 wrote to memory of 2272 1592 StikyNot.exe 36 PID 1592 wrote to memory of 2272 1592 StikyNot.exe 36 PID 1592 wrote to memory of 2272 1592 StikyNot.exe 36 PID 1592 wrote to memory of 2272 1592 StikyNot.exe 36 PID 1592 wrote to memory of 2272 1592 StikyNot.exe 36 PID 2272 wrote to memory of 1000 2272 diskperf.exe 38 PID 2272 wrote to memory of 1000 2272 diskperf.exe 38 PID 2272 wrote to memory of 1000 2272 diskperf.exe 38 PID 2272 wrote to memory of 1000 2272 diskperf.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"2⤵PID:2480
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"2⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"4⤵
- Executes dropped EXE
PID:1808
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"4⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"5⤵
- Executes dropped EXE
PID:1000
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
965KB
MD54c6d077efc220f1f2b940a55c22055d3
SHA1e37cfad0a8e328d2d60b2fbaf19db91a73966849
SHA256bda2ca03c7cc1a1176e210747275d8f05cf1ad5eadb608859ff90db1a591071e
SHA5121054748a878896eb330545b1eaf80ab016091d77ed0a37e6aea8046985858199a97a41d983bb251d3d518d0394c321182b7c2d5e805c305a3e87a23ea6d20429