Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 01:56

General

  • Target

    77877a57ab2d93042bae010c7342a423_JaffaCakes118.exe

  • Size

    4.9MB

  • MD5

    77877a57ab2d93042bae010c7342a423

  • SHA1

    a3ea2c10c6812257a650d7890d7a278d8b67d371

  • SHA256

    677471e9121f4a29a8b0ea4e6a1c730bd0e2908f1c517c8356909f69007efab3

  • SHA512

    979fe536402cb3ea776274ed3f961507508334e518bbe5ad589855e3aa46deac0766e02c91bf9dba8a91ebf6a75b9c9a18efc24c6ca4f22e712c7f3f9a6e08df

  • SSDEEP

    98304:pAI+mVN/BclFu8oj2/sJ1QXzy6R/ib93ov7D9EHudivaA3LFS07uvdRu3N6lXo91:itkWFUjv1ozD9EHIkFSocd4Ae1

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77877a57ab2d93042bae010c7342a423_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\77877a57ab2d93042bae010c7342a423_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Program Files (x86)\Pegasun&Chistilka\Pegasun&Chistilka\AU3_raps.exe
      "C:\Program Files (x86)\Pegasun&Chistilka\Pegasun&Chistilka\AU3_raps.exe"
      2⤵
      • Executes dropped EXE
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Pegasun&Chistilka\Pegasun&Chistilka\AU3_raps.exe

    Filesize

    212KB

    MD5

    697051cd93a6bcd50e02955f089a9d0e

    SHA1

    6ba844cf9230a52ec25a76aa42bdec4aac79ba0e

    SHA256

    d5e2867f294649fc73f632f6c02b71b94b952ec44562f41aef59d7a878778098

    SHA512

    16612f71aa03eef077f20394164532e33c7e2e9c1384c4a857e77be77b9f629d43edb78db85a877906248b474f8ba69213f34199a657d254c915a7da9ac7aeb2

  • C:\Program Files (x86)\Pegasun&Chistilka\Pegasun&Chistilka\SystemUtilities\bin\Defragmentor.exe.config

    Filesize

    214B

    MD5

    4194fa999171a240c821cc4a7b765439

    SHA1

    d88eb7d47ac4ef13b1468baed9a74ff7bf912523

    SHA256

    4665799ac4d842fa2b2ab354144d6ebcc7529f429d972048d778a06a05d29583

    SHA512

    60785ed9a2fb2bdfec4e13ccbece50e7e81c408727084317b60a1be88ae2b2d6a3b0008da82f507a7a2bdac1a22584759c3fbacaf0bc602fd53f19a7043bb8b7

  • C:\Program Files (x86)\Pegasun&Chistilka\Pegasun&Chistilka\SystemUtilities\bin\PrivacyGuardian.exe.config

    Filesize

    231B

    MD5

    2577e4b144efcb577e51c1439155079a

    SHA1

    8ac376d232d195179755bbfd1b20555e28fffddd

    SHA256

    bb7acfd577ed69baff19c245537c289b340d559f2b4152f9f3c1db9cc97ecde9

    SHA512

    321506f74ca86e344bac3a79520de995501d18d634471f980fb314d1ee32ee2dd2705a2a608625f3d6b109eb444fc50ab83754d9a88f40ca86ebb0b8f5468578

  • memory/684-259-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2548-261-0x0000000002050000-0x0000000002075000-memory.dmp

    Filesize

    148KB

  • memory/2548-262-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2548-263-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2548-265-0x0000000002050000-0x0000000002075000-memory.dmp

    Filesize

    148KB

  • memory/2548-266-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2548-267-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2548-269-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2548-270-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB