Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 04:47
Static task
static1
Behavioral task
behavioral1
Sample
9d043e124298e99a5e49df6fc0868463_JaffaCakes118.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9d043e124298e99a5e49df6fc0868463_JaffaCakes118.ps1
Resource
win10v2004-20240508-en
General
-
Target
9d043e124298e99a5e49df6fc0868463_JaffaCakes118.ps1
-
Size
541KB
-
MD5
9d043e124298e99a5e49df6fc0868463
-
SHA1
9b75c08b1de6c4fa2618be2f29e252a49080dc0f
-
SHA256
48ce6c67da546ac753e2cec2ead479967b236687efa5c89d4dbc2d2bb1594542
-
SHA512
fa425629c91072f4e9c6e231dcda732ab824f3c04a0ae6b5e5e4a0d2aad6f92056438952bdb4a33bc1d0c8b500c6f68fcf4826d474e49b6585fcce8b224f1bdf
-
SSDEEP
12288:0PQElQKyeq54mC5aoOI1CjzXVvHnR9EM7yV:kQaW4m1jzXP7K
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 3 IoCs
pid Process 2728 rafl.exe 2672 rafl.exe 2816 rafl.exe -
Loads dropped DLL 5 IoCs
pid Process 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 2816 2728 rafl.exe 31 -
pid Process 2304 powershell.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2728 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2304 powershell.exe 2728 rafl.exe 2728 rafl.exe 2728 rafl.exe 2728 rafl.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2728 rafl.exe 2728 rafl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2728 2304 powershell.exe 29 PID 2304 wrote to memory of 2728 2304 powershell.exe 29 PID 2304 wrote to memory of 2728 2304 powershell.exe 29 PID 2304 wrote to memory of 2728 2304 powershell.exe 29 PID 2728 wrote to memory of 2672 2728 rafl.exe 30 PID 2728 wrote to memory of 2672 2728 rafl.exe 30 PID 2728 wrote to memory of 2672 2728 rafl.exe 30 PID 2728 wrote to memory of 2672 2728 rafl.exe 30 PID 2728 wrote to memory of 2816 2728 rafl.exe 31 PID 2728 wrote to memory of 2816 2728 rafl.exe 31 PID 2728 wrote to memory of 2816 2728 rafl.exe 31 PID 2728 wrote to memory of 2816 2728 rafl.exe 31 PID 2728 wrote to memory of 2816 2728 rafl.exe 31 PID 2728 wrote to memory of 2504 2728 rafl.exe 32 PID 2728 wrote to memory of 2504 2728 rafl.exe 32 PID 2728 wrote to memory of 2504 2728 rafl.exe 32 PID 2728 wrote to memory of 2504 2728 rafl.exe 32
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9d043e124298e99a5e49df6fc0868463_JaffaCakes118.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Public\rafl.exe"C:\Users\Public\rafl.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Public\rafl.exe"C:\Users\Public\rafl.exe"3⤵
- Executes dropped EXE
PID:2672
-
-
C:\Users\Public\rafl.exe"C:\Users\Public\rafl.exe"3⤵
- Executes dropped EXE
PID:2816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1683⤵
- Loads dropped DLL
- Program crash
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD58ab3dcbd9c9ef807b6dd4413c3992ddc
SHA147c5313a62d5591e23308d01357893d04f346df0
SHA25674964d3bd7961e2ca1a131b85c234eb4614190d5a50628fa5b54423e74be357e
SHA5120c38024314beebc27194fbc6b795670a4a4981beb8c48bdec2946f79b82b1c2aba18ec407a5b1daefdb7fc7a702934b0639e2ed1e135b428902d64e7992095e1