Analysis
-
max time kernel
135s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe
-
Size
264KB
-
MD5
961da8d2f90bb5bf4d0bf69aa460db72
-
SHA1
6e6a0126390557080e94cc72410c3577de97ef74
-
SHA256
411ea339198e5bdc7d08442f18b2b81e0001985b67aa5ac6c70eff4039b6aa01
-
SHA512
44ca669e3590b51ae055a2efe29bd330793db6f0038e2e23bc3bc890c0023a00635a043a372a91980e6d67527d64af6810e191d99c16f267760a1272f0cd92ec
-
SSDEEP
3072:Lij6wlD6baAeX0+SCPsaqXQaMSC6rBy9HtVN6kjgPrqUhhyWTg4+wg1kr:LuTf0EN8QZgyhIdPrqgEWbNgar
Malware Config
Extracted
azorult
http://twoo.or.ug/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4320 3092 WerFault.exe 82 -
Checks SCSI registry key(s) 3 TTPs 20 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3092 961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\961da8d2f90bb5bf4d0bf69aa460db72_JaffaCakes118.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 13922⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3092 -ip 30921⤵PID:3320