Analysis Overview
SHA256
bda2ca03c7cc1a1176e210747275d8f05cf1ad5eadb608859ff90db1a591071e
Threat Level: Known bad
The file 4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Azorult
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Suspicious use of SetThreadContext
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
NTFS ADS
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-16 18:19
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-16 18:19
Reported
2024-05-16 18:22
Platform
win7-20240215-en
Max time kernel
147s
Max time network
124s
Command Line
Signatures
Azorult
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\diskperf.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\diskperf.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\diskperf.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1240 set thread context of 2480 | N/A | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe |
| PID 1240 set thread context of 2512 | N/A | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe | C:\Windows\SysWOW64\diskperf.exe |
| PID 1592 set thread context of 1808 | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe |
| PID 1592 set thread context of 2272 | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | C:\Windows\SysWOW64\diskperf.exe |
NTFS ADS
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | C:\Windows\SysWOW64\diskperf.exe | N/A |
| File created | C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe | C:\Windows\SysWOW64\diskperf.exe | N/A |
| File created | C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | C:\Windows\SysWOW64\diskperf.exe | N/A |
| File created | C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe | C:\Windows\SysWOW64\diskperf.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"
C:\Windows\SysWOW64\diskperf.exe
"C:\Windows\SysWOW64\diskperf.exe"
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"
C:\Windows\SysWOW64\diskperf.exe
"C:\Windows\SysWOW64\diskperf.exe"
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | fxcoin.in | udp |
| US | 8.8.8.8:53 | fxcoin.in | udp |
| US | 8.8.8.8:53 | fxcoin.in | udp |
| US | 8.8.8.8:53 | fxcoin.in | udp |
Files
memory/1240-0-0x00000000003B0000-0x00000000003B1000-memory.dmp
memory/1240-1-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/1240-3-0x00000000003B0000-0x00000000003B1000-memory.dmp
memory/2480-19-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2480-17-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2480-22-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2480-15-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2480-13-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2480-11-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2480-9-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2480-7-0x0000000000400000-0x0000000000420000-memory.dmp
memory/2512-27-0x0000000000400000-0x0000000000411000-memory.dmp
memory/2512-28-0x0000000000400000-0x0000000000411000-memory.dmp
memory/1240-29-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/2512-25-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2512-23-0x0000000000400000-0x0000000000411000-memory.dmp
memory/2512-30-0x0000000000400000-0x0000000000411000-memory.dmp
memory/2512-31-0x0000000000400000-0x0000000000411000-memory.dmp
memory/2480-32-0x0000000000400000-0x0000000000420000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Disk.sys
| MD5 | 4c6d077efc220f1f2b940a55c22055d3 |
| SHA1 | e37cfad0a8e328d2d60b2fbaf19db91a73966849 |
| SHA256 | bda2ca03c7cc1a1176e210747275d8f05cf1ad5eadb608859ff90db1a591071e |
| SHA512 | 1054748a878896eb330545b1eaf80ab016091d77ed0a37e6aea8046985858199a97a41d983bb251d3d518d0394c321182b7c2d5e805c305a3e87a23ea6d20429 |
memory/2512-51-0x0000000000400000-0x0000000000411000-memory.dmp
memory/1592-52-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/1592-78-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/1808-80-0x0000000000400000-0x0000000000420000-memory.dmp
memory/1000-96-0x0000000000400000-0x00000000004F8000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-16 18:19
Reported
2024-05-16 18:22
Platform
win10v2004-20240226-en
Max time kernel
153s
Max time network
160s
Command Line
Signatures
Azorult
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\SyncHost.exe" | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3604 set thread context of 4800 | N/A | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe |
| PID 3604 set thread context of 4644 | N/A | C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe | C:\Windows\SysWOW64\diskperf.exe |
| PID 3272 set thread context of 3720 | N/A | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe |
NTFS ADS
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe | C:\Windows\SysWOW64\diskperf.exe | N/A |
| File created | C:\Users\Admin\AppData\Local\Chrome\C:\Users\Admin\AppData\Local\Chrome\SyncHost.exe | C:\Windows\SysWOW64\diskperf.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3812 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8
C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\4c6d077efc220f1f2b940a55c22055d3_JaffaCakes118.exe"
C:\Windows\SysWOW64\diskperf.exe
"C:\Windows\SysWOW64\diskperf.exe"
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"
C:\Windows\SysWOW64\diskperf.exe
"C:\Windows\SysWOW64\diskperf.exe"
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
"C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 80.90.14.23.in-addr.arpa | udp |
| US | 13.107.253.64:443 | tcp | |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | fxcoin.in | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | fxcoin.in | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| GB | 216.58.212.202:443 | chromewebstore.googleapis.com | tcp |
| US | 8.8.8.8:53 | 202.212.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.73.42.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | fxcoin.in | udp |
| US | 8.8.8.8:53 | fxcoin.in | udp |
Files
memory/3604-0-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/3604-1-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
memory/3604-2-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/3604-4-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
memory/4800-8-0x0000000000400000-0x0000000000420000-memory.dmp
memory/4800-10-0x0000000000400000-0x0000000000420000-memory.dmp
memory/4800-14-0x0000000000400000-0x0000000000420000-memory.dmp
memory/3604-13-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/4644-15-0x0000000000400000-0x0000000000411000-memory.dmp
memory/4644-16-0x0000000000400000-0x0000000000411000-memory.dmp
memory/4644-17-0x0000000000400000-0x0000000000411000-memory.dmp
memory/4644-18-0x0000000000400000-0x0000000000411000-memory.dmp
memory/3604-19-0x0000000000400000-0x00000000004F8000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Disk.sys
| MD5 | 4c6d077efc220f1f2b940a55c22055d3 |
| SHA1 | e37cfad0a8e328d2d60b2fbaf19db91a73966849 |
| SHA256 | bda2ca03c7cc1a1176e210747275d8f05cf1ad5eadb608859ff90db1a591071e |
| SHA512 | 1054748a878896eb330545b1eaf80ab016091d77ed0a37e6aea8046985858199a97a41d983bb251d3d518d0394c321182b7c2d5e805c305a3e87a23ea6d20429 |
C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
memory/4800-32-0x0000000000400000-0x0000000000420000-memory.dmp
memory/4800-35-0x0000000000400000-0x0000000000420000-memory.dmp
memory/3272-42-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/4644-43-0x0000000000400000-0x0000000000411000-memory.dmp
memory/3272-44-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/3272-57-0x0000000000400000-0x00000000004F8000-memory.dmp
memory/3720-58-0x0000000000420000-0x00000000004E9000-memory.dmp
memory/3720-59-0x0000000000400000-0x0000000000420000-memory.dmp