Malware Analysis Report

2024-08-06 13:46

Sample ID 240519-t5b7xafg23
Target 5a610962baf6081eb809a9e460599871_JaffaCakes118
SHA256 bc598b8327d9bbffdf96e2f972f2be0794e4e994771c6b0c84d9326921604db7
Tags
azorult infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bc598b8327d9bbffdf96e2f972f2be0794e4e994771c6b0c84d9326921604db7

Threat Level: Known bad

The file 5a610962baf6081eb809a9e460599871_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

azorult infostealer trojan

Azorult

Deletes itself

Checks computer location settings

Unsigned PE

Enumerates physical storage devices

Delays execution with timeout.exe

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-19 16:38

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-19 16:38

Reported

2024-05-19 16:40

Platform

win7-20240508-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Enumerates physical storage devices

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 1 & del "C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe"

C:\Windows\SysWOW64\timeout.exe

timeout 1

Network

Country Destination Domain Proto
US 8.8.8.8:53 mike.rivalserver.com udp

Files

memory/1892-0-0x00000000029A0000-0x0000000002A45000-memory.dmp

memory/1892-1-0x0000000000400000-0x00000000004A5000-memory.dmp

memory/1892-2-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1892-3-0x00000000029A0000-0x0000000002A45000-memory.dmp

memory/1892-4-0x0000000000400000-0x00000000004A5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-19 16:38

Reported

2024-05-19 16:40

Platform

win10v2004-20240508-en

Max time kernel

141s

Max time network

105s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe"

Signatures

Azorult

trojan infostealer azorult

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe N/A

Enumerates physical storage devices

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 1 & del "C:\Users\Admin\AppData\Local\Temp\5a610962baf6081eb809a9e460599871_JaffaCakes118.exe"

C:\Windows\SysWOW64\timeout.exe

timeout 1

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 101.58.20.217.in-addr.arpa udp
NL 23.62.61.160:443 www.bing.com tcp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 mike.rivalserver.com udp
US 8.8.8.8:53 160.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 73.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/1336-0-0x0000000002630000-0x00000000026D5000-memory.dmp

memory/1336-1-0x0000000000400000-0x00000000004A5000-memory.dmp

memory/1336-4-0x0000000000400000-0x00000000004A5000-memory.dmp

memory/1336-2-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1336-3-0x0000000002630000-0x00000000026D5000-memory.dmp