Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
63b4fa12cceff44442c51e7bc4d0b9e0
-
SHA1
2eda2403c50d169085b04263f0607003bbebe007
-
SHA256
dd3079431259f85345c35fe1a440b12354520b1ee0cab2daeab3ce6480f94da0
-
SHA512
4818b595f87f2f914f7573130477cf4775a33a717937871ac3dd3a71cb6672ca1a2d4313b8f413e9628245b9f3d383550b37899f74c030766c08d8838e7d3538
-
SSDEEP
24576:K5xolYQY6AAHnh+eWsN3skA4RV1Hom2KXMmHanEKUePR/P252:dY6h+ZkldoPK8Yan3k2
Malware Config
Extracted
azorult
http://151.106.27.237/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 7 IoCs
pid Process 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 1040 icsys.icn.exe 4276 explorer.exe 3056 spoolsv.exe 1888 svchost.exe 4524 spoolsv.exe 4268 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023469-7.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 548 set thread context of 4268 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 89 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1040 icsys.icn.exe 1040 icsys.icn.exe 4276 explorer.exe 4276 explorer.exe 4276 explorer.exe 4276 explorer.exe 4276 explorer.exe 4276 explorer.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 1888 svchost.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 1888 svchost.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe 1888 svchost.exe 4276 explorer.exe 4276 explorer.exe 1888 svchost.exe 4276 explorer.exe 1888 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4276 explorer.exe 1888 svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 1040 icsys.icn.exe 1040 icsys.icn.exe 4276 explorer.exe 4276 explorer.exe 3056 spoolsv.exe 3056 spoolsv.exe 1888 svchost.exe 1888 svchost.exe 4524 spoolsv.exe 4524 spoolsv.exe 4276 explorer.exe 4276 explorer.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4900 wrote to memory of 548 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 83 PID 4900 wrote to memory of 548 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 83 PID 4900 wrote to memory of 548 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 83 PID 4900 wrote to memory of 1040 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 84 PID 4900 wrote to memory of 1040 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 84 PID 4900 wrote to memory of 1040 4900 63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe 84 PID 1040 wrote to memory of 4276 1040 icsys.icn.exe 85 PID 1040 wrote to memory of 4276 1040 icsys.icn.exe 85 PID 1040 wrote to memory of 4276 1040 icsys.icn.exe 85 PID 4276 wrote to memory of 3056 4276 explorer.exe 86 PID 4276 wrote to memory of 3056 4276 explorer.exe 86 PID 4276 wrote to memory of 3056 4276 explorer.exe 86 PID 3056 wrote to memory of 1888 3056 spoolsv.exe 87 PID 3056 wrote to memory of 1888 3056 spoolsv.exe 87 PID 3056 wrote to memory of 1888 3056 spoolsv.exe 87 PID 1888 wrote to memory of 4524 1888 svchost.exe 88 PID 1888 wrote to memory of 4524 1888 svchost.exe 88 PID 1888 wrote to memory of 4524 1888 svchost.exe 88 PID 548 wrote to memory of 4268 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 89 PID 548 wrote to memory of 4268 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 89 PID 548 wrote to memory of 4268 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 89 PID 548 wrote to memory of 4268 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 89 PID 548 wrote to memory of 4268 548 63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe 89 PID 1888 wrote to memory of 4896 1888 svchost.exe 90 PID 1888 wrote to memory of 4896 1888 svchost.exe 90 PID 1888 wrote to memory of 4896 1888 svchost.exe 90 PID 1888 wrote to memory of 3616 1888 svchost.exe 106 PID 1888 wrote to memory of 3616 1888 svchost.exe 106 PID 1888 wrote to memory of 3616 1888 svchost.exe 106 PID 1888 wrote to memory of 3816 1888 svchost.exe 112 PID 1888 wrote to memory of 3816 1888 svchost.exe 112 PID 1888 wrote to memory of 3816 1888 svchost.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63b4fa12cceff44442c51e7bc4d0b9e0_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\users\admin\appdata\local\temp\63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exec:\users\admin\appdata\local\temp\63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\Users\Admin\AppData\Local\Temp\63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe"c:\Users\Admin\AppData\Local\Temp\63b4fa12cceff44442c51e7bc4d0b9e0_jaffacakes118.exe "3⤵
- Executes dropped EXE
PID:4268
-
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4524
-
-
C:\Windows\SysWOW64\at.exeat 15:01 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:4896
-
-
C:\Windows\SysWOW64\at.exeat 15:02 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:3616
-
-
C:\Windows\SysWOW64\at.exeat 15:03 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵PID:3816
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD56f8fdab50b949b040bd2411806845324
SHA1f8fd4829bd5a7da2c99b1d26fe73a80dbee1f1dc
SHA25624cede566cb189bd625b7a3c83213cd33f31c37c8a5d32c32519ce3276a85379
SHA512634ac1e3abcabf2a1ced0ee00535f736305c564724ab3b576230f996c07fd2ae705578bf7123c555eaf79557fa090c9aac84ad24575e539d488c948752589f21
-
Filesize
274KB
MD57673a2465dec560e731bb44e82d39f8f
SHA12b142f2d1f78eec71f1d8303fda4507346a723e7
SHA25641fba11bf233d46f9c36d5d885db0d275d1cb992f133c2cb443d093b23f53508
SHA5126a00ce1a9d84d7730805838f9575e04a3fbd0905d62b2816e942b48628b260310eb3e313dcdf7eaa51ad257a4a31b5fc83d0633bc1d9e545dc0dba63bbfdc7e1
-
Filesize
274KB
MD588d9dcf12fafbcc68305c6ffebb3c0cd
SHA14a02cbb53e83b88354e954600d92514d09509215
SHA256e4c8dcf405259aca2d3304db8905067fdf1350593e687fb1a875a47ec2f6e67c
SHA5121b3cf8a420d5f7a98aae73eb095d04ea3d8f680076762c220fe242712ca5e350a924b75978f1a08e7620a8309747a5b93671a543a9cd9e6cb74153d2b703b842
-
Filesize
274KB
MD539adff4fddba4f4f40111fcdbc93be57
SHA175055048ca7c45d9abf62d6b7c4c5e7f5eb5964a
SHA2563c4a65039ab9a043865e98b8f2558edebe83913301d6539c2a3d49d30d48537a
SHA51274aeedf27006fff6b2e0b850a46bd5d1e39d81977b111587ff58c5a7e5bf50f16054a44980c096601894d166dac3adf2795d0648f10046ebea7e3126ef4aa1c7
-
Filesize
274KB
MD5d3b7ce2674677327bb26a767c2713aee
SHA1503ade8d378ae476a0f80972afc69567b5c33a44
SHA256156910df884f9c5122e75ef7214824cddefeb080a0607a808786ba9235e1fefc
SHA5127993aeb5a48242e65d415adaed8d84e6a317bd2bddc833c48b707ed43297a1a1259b2739cdbb663366e4e728a6b2280c8e1cfce312da33e88b582817cfacbf76
-
Filesize
274KB
MD5295562413bb66b8a049af4cb5451215a
SHA1a2a1201f8b358336c09f1a5304b7525fa539ffbb
SHA2568b079ef26ab34b93a8abc88c649873c44cede92079fe1cd75f983c9bc0aabe41
SHA512de9a98f6f762f4eae42823f2aeb422f8e1a4e8f6ee41d7a7c0cc5cbf60f85ba85d1a6e467e87f5d7b89d5c301600e67dce64ce30113baa25fff925b96341ac66