Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
8c2e3d87b590b8acdf3b0aa26a3a115b
-
SHA1
ee96e21cfa70bb9082a08f1468bae6754778ee38
-
SHA256
1d82b1e76c9c79da1f563a3b990ad6ef521aa0685694b1e5e5acab2cb843d161
-
SHA512
99501f6c599f4267d0dc73590b807769ee6032b3d7cf22372a2370e0d6e54502a34e07d3405a599255411cc5f977dfaac2b0f9dbbe5782f139573a96081a376d
-
SSDEEP
49152:jEfKUv4KjEL7xOIpZ3RHDLfzS34XMXgSh:QRIBZHDLfG3qMX7
Malware Config
Extracted
azorult
http://siteverification.site/azo/gate.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2132 cmd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Wine 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 836 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2328 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 836 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 836 wrote to memory of 2132 836 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe 28 PID 836 wrote to memory of 2132 836 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe 28 PID 836 wrote to memory of 2132 836 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe 28 PID 836 wrote to memory of 2132 836 8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe 28 PID 2132 wrote to memory of 2328 2132 cmd.exe 30 PID 2132 wrote to memory of 2328 2132 cmd.exe 30 PID 2132 wrote to memory of 2328 2132 cmd.exe 30 PID 2132 wrote to memory of 2328 2132 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 1 & del "C:\Users\Admin\AppData\Local\Temp\8c2e3d87b590b8acdf3b0aa26a3a115b_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2328
-
-