Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe
-
Size
401KB
-
MD5
507385b76cdd9b6eb66bd848d5f610e7
-
SHA1
d42e38e87d70ea197415b25dbcb06c107b7d74b8
-
SHA256
d1b61efec101357e17ff70f1b7fb937fcea4a4c73ef24d77ed2a484315186c86
-
SHA512
311aeb502cbcf59beda5f033a9e85dfa1afb2a0d16c90e200c4c1d846ccb46ea5c3b0df69abfee6c2dacfc51ee43e566f8c1bab8a1680e5d8243b5d54dd9c7ff
-
SSDEEP
6144:aVmt78kc9NuzrYyyTZC9e2HyTkZtOiV64cYl5gR8O2VRrhZMYXPo3:aQJ8ZYyTZ92HyTpiV67bRiZvPM
Malware Config
Extracted
azorult
http://141.105.64.136/lekon/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1480-9-0x0000000006030000-0x000000000603A000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1480 set thread context of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97 PID 1480 wrote to memory of 3084 1480 507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\507385b76cdd9b6eb66bd848d5f610e7JaffaCakes118.exe"2⤵PID:3084
-